Home / Spyware Encyclopedia / Trojan.heur.vp << Back

Recommendation to Automatically remove Trojan.heur.vp


Our products can remove Trojan.heur.vp and thousands of other Virus and Spyware automatically and instantly.

Trojan.heur.vp Details


  • Category Trojan
  • Discovered 12/12/2015 10:51:48 PM
  • Modified 1/23/2024 10:24:29 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f22f768a5f9f31cdd7ad343f0a36945007d429fb0b7202dd27b147786a210e6b.exe 393216JX356.Net4.009aa266340be1a6227862a94388df1cec 
01367865b11034f003e6af59dfd1319e62989905bbf9015fca94b50e0c14de661790607bf570719f07efd3c5db405c411a6.exe 24576  d29f53488da91cfd8e8cf959cfcff363 
7f64ac29861f31bb8a8250e2268cf4e0.exe 253440  bf147a3d3fc8c2f153717843827f352f 
4922da18a0d525827ed578caf1ce2407e1ab6b83a54039c351e456f6736a9650.exe 126976GOOGLE1.0022e5ed83a28e90af51003a04e0feb71f 
62f8c79dc5c35b1e7f3aa4561a9cc93b9d15b2df643154dd8a6e02cbcf6417f75c2f775cefdac9918e0d6d4f07af8572010.exe 687772  e587fa70ab8b95a6ea80704fabe7fb4f 
842b41bbe80f0917406edf82ce2d1c43.vxe.exe 405504Wang1.01842b41bbe80f0917406edf82ce2d1c43 
b478c113f09ecdc7b401b5fae21df43f.vxe.exe 933888RichTech Corporation2.00.0005b478c113f09ecdc7b401b5fae21df43f 
8765ade309bd262f0b75fc531285f071.vxe.exe 933888RichTech Corporation2.00.00058765ade309bd262f0b75fc531285f071 
2704c2040034c8bd385bfc8787dd226e.vxe.exe 1032192hima1.002704c2040034c8bd385bfc8787dd226e 
e07f282884cd3fe77443deda28fd7188c1e84dad.bin.exe 654856  23466552e46ca24fa9aaaa63ff27c8bb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware