Home / Spyware Encyclopedia / Trojan.PEF13C.oig << Back

Recommendation to Automatically remove Trojan.PEF13C.oig


Our products can remove Trojan.PEF13C.oig and thousands of other Virus and Spyware automatically and instantly.

Trojan.PEF13C.oig Details


  • Category Trojan
  • Discovered 7/24/2013 12:13:52 AM
  • Modified 2/27/2014 12:30:04 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
16e65defc3b6207a05950b7a491c74ef.vir.exe 684432  16e65defc3b6207a05950b7a491c74ef 
10826ce0ae926967a29cf944936b7eae.vir.exe 770170  10826ce0ae926967a29cf944936b7eae 
1858260356374c085237a20aff65c0b3c754c81349048e46244b1e55b7ae11ee77fb66499e3a593d15cd4e08a4a39.exe 851968  fb1318a69176b6f1c5be0ee7aa9a269c 
940c8630f2a53646377d20067294fe18.vir.exe 999568  940c8630f2a53646377d20067294fe18 
46faba92686f29499861181c4d776eb0.vir.exe 765483  46faba92686f29499861181c4d776eb0 
15463405627a813eb16c64bb19a85226233c43705b9311e2f590f72b510cc27e5c80e4cb014bd9617b679bb45187b.exe 1556480  22328d48e167887d337c73b3efa382a4 
dc5540787b13ff839daebddcae179c73.exe 11900626  dc5540787b13ff839daebddcae179c73 
d25339d3b60c99d83984ddbd4e7cbe85.vir.exe 808490  d25339d3b60c99d83984ddbd4e7cbe85 
1ad2d0200582e69346f6b852f48b1539.vir.exe 806652  1ad2d0200582e69346f6b852f48b1539 
1737360109124337620aafb372275cc849a8242e87e5a583edafd0b9280560b95aaf851e80fbffd79d1e02c0fbe00.exe 2931305唯一登陆器专用版1.0.0.03a20e70f5f15b4e673e8038b8efc6b0c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware