Home / Spyware Encyclopedia / Trojan.Sweetpacks/SweetIM << Back

Recommendation to Automatically remove Trojan.Sweetpacks/SweetIM


Our products can remove Trojan.Sweetpacks/SweetIM and thousands of other Virus and Spyware automatically and instantly.

Trojan.Sweetpacks/SweetIM Details


  • Category Trojan
  • Discovered 6/11/2015 2:46:31 PM
  • Modified 2/3/2024 1:08:24 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
guardius.exe 582448SweetIM Technologies Ltd.2, 9, 0, 158d7dd2b21c5a455a8b2e2a22addc848 
efbb7f412eada38ef9209259c4268e8b.vir.exe 123184SweetIM Technologies Ltd.3, 4, 0, 51c272ba99e078e53d8c0b9a5c2527696 
b46f3f0c4d8117bd3d3b0dd8210b66e2.vir.exe 462640SweetIM Technologies, Ltd.1, 0, 0, 427fb892d009dd65c998ee8bc13e66b0a 
d07374c22b44000524042d3ebf983c41.exe 310072SweetIM Technologies Ltd.1, 1, 0, 5cf05651f3ef4010a72ff4d46f4f81951 
29f90e29fed946b8896b6c1868baab11.vir.exe 390968SweetIM Technologies, Ltd.1, 0, 0, 429f90e29fed946b8896b6c1868baab11 
5666522c9d345fa786b00dfa77b34f05.vir.exe 206848SweetIM Technologies Ltd.4, 6, 0, 4a90a241dc68360368f6bf8d0b7ec2701 
d5f57901d577be31a7b5c4c7ce04b16a.vir.exe 234152  d5f57901d577be31a7b5c4c7ce04b16a 
1158fe6a5b78a3a6268707a4bfc3d526.vir.exe 116576  1158fe6a5b78a3a6268707a4bfc3d526 
31ad00046170bc4422b9d2268db6e27d.exe 114688SweetIM Technologies Ltd.2, 8, 0, 125f1ace6c2b0440cf7c01b81b2336f14f 
5ed266b0f97610c4611fba5ba2df6b29.exe 1503232  5ed266b0f97610c4611fba5ba2df6b29 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware