Home / Spyware Encyclopedia / Trojan.heur.s << Back

Recommendation to Automatically remove Trojan.heur.s


Our products can remove Trojan.heur.s and thousands of other Virus and Spyware automatically and instantly.

Trojan.heur.s Details


  • Category Trojan
  • Discovered 1/22/2013 12:02:36 AM
  • Modified 10/5/2023 4:39:22 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
69bb0ab7c22e04f75f392aa9db116cdbc0686a06cb4ca1c6ffcb46f77c3223de.exe 37888  4e1e849bf175a4e8345ebfe3f42121e3 
d92264d884f1862c5f4b560e036844c6722524e57e8513d1b2d7ed43fb0f3251.exe 200195  1d101af6c2446cb61a019195fb071549 
2f07fa5687c9e9e0c3b5d3974cc7020b49edf45320310d4c0361197dbc78a56abd1bd89d7d55e9aef650b36c1da4b6fa42d.exe 86016  59c50f4a4295033c4feb2fa5eb7dad13 
d81e93102c73c291a516dd71cac7770422eaf3a85fced81adac9aff80434f091e76966c736ed57dabd11c68cd34d8461c3c.exe 139264  aa4a3f275f2f290546a57de4cf536cef 
878a70785a2d3f2abffc7d6cfbf63210.exe 123904  878a70785a2d3f2abffc7d6cfbf63210 
5b888e82a437a92087728784fd27937947d5ac21.bin.exe 1228881  60461a92a01117c6813e1b973262f57c 
aee4ecfc4fe268606ead37d751c3de9d0f849006ec812b1b214379469283c90f.dll 206336  7a8bfc67416eb2f8d1522e91f2f591b2 
c0aed11f38727b1d1f45c2399484f566.exe 277504  c0aed11f38727b1d1f45c2399484f566 
586202cdfc6803ce0e3f7672284e5895.exe 56832  586202cdfc6803ce0e3f7672284e5895 
20183508901a2e6f942dd6e23b64fa33e228879ccecbd5fbb0f11a595fe79db2ee62940bd4a85bb83bd05dccfcc5e.exe 29184  3aa98855947f7ab6b47b0fb6722f0d97 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware