Home / Spyware Encyclopedia / Trojan.Blueh.ab << Back

Recommendation to Automatically remove Trojan.Blueh.ab


Our products can remove Trojan.Blueh.ab and thousands of other Virus and Spyware automatically and instantly.

Trojan.Blueh.ab Details


  • Category Trojan
  • Discovered 4/8/2024 1:40:41 AM
  • Modified 4/8/2024 10:31:50 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
93767468be616b998c9d5709efb9ca74.exe 69632BlueHeaven54885, 3, 4, 193767468be616b998c9d5709efb9ca74 
8218780aa184cd6cf023a86aa27a7f8ff2c8d651d0d956e0604189ffdfc31b0d.exe 524069Realtek Semiconductor Corp.1, 6, 0, 49862196f663985d30bb1046f55df0ab5 
a035989f59d8152aedffee8ef2f8fffc.vxe.exe 571581Electronic Arts Inc.1.05.04.00a035989f59d8152aedffee8ef2f8fffc 
0465e58f8c6a8fe385176960a8dd82dca4e838c9.bin.exe 456381BlueHeaven54885, 3, 4, 1a1e9034a036b4d025cf1473254acd9ec 
e3654f8a41970af8c47b3e439c0c5de5.exe 4187301Acresso Software Inc.15.0.498e3654f8a41970af8c47b3e439c0c5de5 
142872002344489682c5ea3575d99a1d.exe 521821BlueHeaven54885, 3, 4, 1142872002344489682c5ea3575d99a1d 
2ae0b33ece29e7b37504244ad60ca888232cf1ce.bin.exe 4411245AVG Technologies10, 0, 0, 76f79774cfcb7c11621523c48b06d83b4 
b8b21d7838642a15ceab39ab725f432c.exe 736445Microsoft1.0.0.0b8b21d7838642a15ceab39ab725f432c 
fb62e90e367e2dc7cca71ce445ee6f784a9160e2.bin.exe 957117Facebook Inc.1.2.205.052b4bfddbdad94713bd6a6c654ab4b29 
4972f5e8a2d2b9f700d191d4aabd7bd0.exe 746685Microsoft1.0.0.04972f5e8a2d2b9f700d191d4aabd7bd0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware