Home / Spyware Encyclopedia / Trojan.win64.expiro << Back

Recommendation to Automatically remove Trojan.win64.expiro


Our products can remove Trojan.win64.expiro and thousands of other Virus and Spyware automatically and instantly.

Trojan.win64.expiro Details


  • Category Trojan
  • Discovered 10/25/2024 11:15:58 AM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9a7dc39bce9a8915b0d19815e403db80.vir.exe 1027072Apple Inc.3,0,0,109a7dc39bce9a8915b0d19815e403db80 
45db30551ffc47b9f2dd15feddee5b90.vir.exe 250880Microsoft Corporation6.1.7600.16385 (win45db30551ffc47b9f2dd15feddee5b90 
a2a686506aa4341573439fb28ddef3d7.vir.exe 434176Microsoft Corporation6.1.7601.17514 (wina2a686506aa4341573439fb28ddef3d7 
e6fb45812aa553afd460ddd816ea2033.vir.exe 776192Microsoft Corporation6.1.7601.17514 (wine6fb45812aa553afd460ddd816ea2033 
1aa4bc8abb601f04a4d746f6dc8d477c.vir.exe 776192Microsoft Corporation6.1.7601.17514 (win1aa4bc8abb601f04a4d746f6dc8d477c 
f3705397420bc55f1dc90412692ab505.vir.exe 423424Microsoft Corporation6.1.7600.16385 (winf3705397420bc55f1dc90412692ab505 
2e94207f09f1f8fb2e30b893c561aa73.vir.exe 311808Apple Inc.17.344.6.62e94207f09f1f8fb2e30b893c561aa73 
0b7fac41fe9b43a83a4b866b8dfb2bd8.vir.exe 695296Apple Inc.3,0,0,100b7fac41fe9b43a83a4b866b8dfb2bd8 
3e09663e8a3491dcddfcaaa88618ba95.vir.exe 1094656Microsoft Corporation15.0.4727.10013e09663e8a3491dcddfcaaa88618ba95 
e1273ecd1476f409f21c445d6f084e94.vir.exe 355328Microsoft Corporation11.00.9600.17840 (we1273ecd1476f409f21c445d6f084e94 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware