Home / Spyware Encyclopedia / Trojan.Yakes << Back

Recommendation to Automatically remove Trojan.Yakes


Our products can remove Trojan.Yakes and thousands of other Virus and Spyware automatically and instantly.

Trojan.Yakes Details


  • Category Trojan
  • Discovered 4/19/2024 3:03:18 AM
  • Modified 4/19/2024 10:55:07 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3833198b668d1a3aeb22320be76a2862.exe 807276  3833198b668d1a3aeb22320be76a2862 
5d9af268821755326c633234bcf99617.exe 702464Bridge360 Enemy2.5.78.105d9af268821755326c633234bcf99617 
283189c60b9af867ea9feceb4a3a7180.vir.exe 1370140  283189c60b9af867ea9feceb4a3a7180 
20191101141220919262.exe 1976832Zurple Costsend15.3.48.147ce7df5a672e7f3ef6cb034e27933d0e15/11/2019
20191101233253238993.exe 1976832Zurple Costsend15.3.48.14825c616abc8dd6009cf2b9ea1bc87f0815/11/2019
e72b94b01c7e3b980fa4502017a2b3a1.exe 4198786Igor Pavlov9.22 betae72b94b01c7e3b980fa4502017a2b3a117/11/2019
20191115084848314388.exe 804352  673470387764343c16d7e40ec10a53e118/11/2019
ace16122589ce9b9ff8354470fee6bfbfdb42dfae79c38c6f19c432be0aac4a5.exe 1052672  63caafa840d9f0eab716ca934ef5589919/11/2019
567c3c3430fd87075d9c01ac23c0fa79.exe 2742347Digital Extremes2019.06.26.09.39567c3c3430fd87075d9c01ac23c0fa7917/12/2019
b176166ffa8d11acb37d63e1d5a82de8.exe 1282048腾讯QQ1.0.0.0b176166ffa8d11acb37d63e1d5a82de817/12/2019

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware