Home / Spyware Encyclopedia / Trojan.Heur.GM << Back

Recommendation to Automatically remove Trojan.Heur.GM


Our products can remove Trojan.Heur.GM and thousands of other Virus and Spyware automatically and instantly.

Trojan.Heur.GM Details


  • Category Trojan
  • Discovered 7/10/2015 12:18:24 AM
  • Modified 2/29/2024 4:57:16 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a0000482.exe 38693  9d0e8f2ee59af6a001b70790b1bbd412 
6ba64113ee86bd76db4e99848f92c07a.vxe.exe 91268  6ba64113ee86bd76db4e99848f92c07a 
91feb6bb65d19a228a083af1375bee73531b6860f0faffb81a69fea5462f821fc3c5a850f179bfba9ced7c7a10f3a6d941a.exe 112640Microsoft Corporation2000.080.0194.00ddf1e2b4848d7cff0f9a518c85269f8a 
8874e488863ca1663dcd4e5fcfdaa9ee410d9ea55e62d963ec66aa3297d3f92ae4ee5d1bf89995c51a5077615237e9ddc69.exe 45232  ddd7853392ad6add1ac75cfec0e4b77c 
5a4a58d3614ee6715e60824ef058d821d0da7cbb44c2868e17495ce2f4a03f96.dll 53629  6b0bd66b1cf51eae4340185e5673a005 
d7546ba246877019489d4e03c6b0e0c087996975.bin.dll 1091584  84a940c6a3f4a9f91c233a7af2f0aadc 
44b45d2c968dff79e630ead55eb01692bb61b15e9827807d2fe58fa1c5b9f5db809e49f534853ae33d145b6907e3f6f7d19.exe 1980145  0b96dbc6bc72a2030cdebe573abf62d5 
12f1b1054661cd23c9065490b8246b53ca9e81d8dcd9932fb0065de5dd85281fd43ece91457019c5a0e8efd5705d8c3a0d2.dll 1515829  cb9da4f9e30a2c84ec9eb8970440c54d 
2884ead2490a7889f5ef19206bc062409cdbf9cef3900076d4fdcbcb1e7c11ef33029db93f0424b14e6e8971d1d37894215.exe 18432  121131db6841ab46332e0416a70e657b 
309ffa13cdefef6f1f58916e08a7607b.exe 586241  309ffa13cdefef6f1f58916e08a7607b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware