Home / Spyware Encyclopedia / Trojan.Lotok.gen << Back

Recommendation to Automatically remove Trojan.Lotok.gen


Our products can remove Trojan.Lotok.gen and thousands of other Virus and Spyware automatically and instantly.

Trojan.Lotok.gen Details


  • Category Trojan
  • Discovered 10/25/2024 5:44:09 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bc399b374420a52f5ab51390de0eb428.exe 571392  bc399b374420a52f5ab51390de0eb42813/12/2019
20200307022952776338.exe 114176  252a9517a6fc271648825f97fe316d2912/03/2020
7f29666969cd76db1413d740f1b51810.vir.exe 86016  7f29666969cd76db1413d740f1b5181002/09/2020
7e9a37a010dca8088c03b4df5c52c19e.exe 622592  7e9a37a010dca8088c03b4df5c52c19e15/09/2020
d8de3cbcc758512fd88ad32b8e939546.exe 37376  d8de3cbcc758512fd88ad32b8e93954617/02/2021
3d65f1d199fd2d9d7a119732fb18e66cb1d033cd715d11610d3a7dda4f18c096.mrg.exe 1761280  69fd16e3846fac35c923c8e2c5e96dfa01/02/2022
0555c5e7f94d61ae32783b1cbe164ef7.exe 7319552  1d3ce76fb2d0b7203c61bd5fcf63098305/04/2022
1c48aa6245912e253c6cfc2ab669c41d.exe 176128  1c48aa6245912e253c6cfc2ab669c41d21/04/2022
27478fcaea85fdcea27a8dd04264f65cdcf7669d6ffd2606be11cdec4a9a1dd3.mrg.exe 1075712  f353b909e1a00c3f411fa9aabc09dd3222/06/2022
3336cf75cc31e3b473d19852562fb13170af400b0a75299e8aac2028f9a17136.mrg.exe 1904676  0cfd8f5b98731bf79d6078ef63dcc0d215/07/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware