Home / Spyware Encyclopedia / Trojan.Swisyn.bvpz << Back

Recommendation to Automatically remove Trojan.Swisyn.bvpz


Our products can remove Trojan.Swisyn.bvpz and thousands of other Virus and Spyware automatically and instantly.

Trojan.Swisyn.bvpz Details


  • Category Trojan
  • Discovered 8/30/2013 4:16:20 PM
  • Modified 4/15/2024 11:13:15 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8942e5069eb66d4230ef9edeb9f6ecfb.exe 89218  8942e5069eb66d4230ef9edeb9f6ecfb 
130b9399a87718c6bc6e3c8584aeef2d.vxe.exe 331777Microsoft © Corporation1.00130b9399a87718c6bc6e3c8584aeef2d 
32e6d21e5be42a683462ba17b81115e6.exe 89631  32e6d21e5be42a683462ba17b81115e6 
2539996b79b0a543ded67fe3464ce7aa6d85e0b76242d53882f3ebb829a456f9.exe 360455Microsoft © Corporation1.000d438af7854f4aaa37cb89891765cd57 
1a6be8a2c38cc4768de74aecc49f9869.exe 401448Microsoft © Corporation1.001a6be8a2c38cc4768de74aecc49f9869 
1d94ee768140a6ba7ae122d1ccb4f617.vxe.exe 360456Microsoft © Corporation1.001d94ee768140a6ba7ae122d1ccb4f617 
854f7316a431e4e2464af78e41f4e51c8ca0d68fa285bfef8d3b325f1bb3fed8.exe 331776Microsoft © Corporation1.003e8060261ef9937a3f89a09d32a54c64 
4ed80f4f46b4e5f165dbc8795b2e8321.vxe.exe 434176Microsoft © Corporation1.008aab5e165e87d4772af537ec1438538b 
c455b3a8d6c8cde06165211534149ffa.vxe.exe 356385Microsoft © Corporation1.00c455b3a8d6c8cde06165211534149ffa 
1c95b69e3fd26fb5b3a36bdb069350b4f78860d34c3bcd8f763c8cd48ca2e188.exe 360457Microsoft © Corporation1.0010ec00bd3034a3573a8564fb23da5711 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware