Home / Spyware Encyclopedia / Trojan.heur.jp.ai0@agez5uki << Back

Recommendation to Automatically remove Trojan.heur.jp.ai0@agez5uki


Our products can remove Trojan.heur.jp.ai0@agez5uki and thousands of other Virus and Spyware automatically and instantly.

Trojan.heur.jp.ai0@agez5uki Details


  • Category Trojan
  • Discovered 8/13/2022 11:03:18 PM
  • Modified 8/16/2022 1:52:09 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a4bd6cf68f4eadee6197c3a856f807a6.vir.exe 12286Microsoft Corporation4.4.3400bb64705dc6a8216d5ab030334a6bbbec 
a2ea4ae8f0810a3608d9543babd9bd65.vir.exe 12286Microsoft Corporation4.4.3400e01a11498353a0db803735ff6c9aa61e 
bec62ffc075cf7ada22cdb155f5a7622.vir.exe 12286Microsoft Corporation4.4.3400397c75a4d0b3c71786ff2129d7ac30d6 
aab5f02ac39a19b77bd5d270347c3ccf.vir.exe 12286Microsoft Corporation4.4.3400420263994556ce43f6f6c5ad9410e711 
ac809f7ceefa05f5e6752aa33f9a9a4e.vir.exe 12286Microsoft Corporation4.4.34007e6989d55371f9b5d2906241cb15068f 
b5647bce362e7cf5f61ed1059f4d28f2.vir.exe 12286Microsoft Corporation4.4.340085dfc8600bf74308c06cc2d4fa35132c 
d09fb94dff6ebcf40126cb039e9dd1c9.vir.exe 12286Microsoft Corporation4.4.3400ec84fba980c51d08c24ac1b6bde580d9 
a5daec62224de4935c6cde200abc0a9d.vir.exe 12286Microsoft Corporation4.4.3400d21adcdfb823c03c579f2805b96a5406 
a55caf1eff53fcccc36ed3c2bb50f7ca.vir.exe 12286Microsoft Corporation4.4.3400b3f7033d7e657299e996ea56b52351f9 
a2077e5515dfc64d68e1093b61aec780.vir.exe 12286Microsoft Corporation4.4.3400843d5bbf17f900a7222a1302dfbba83c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware