Home / Spyware Encyclopedia / Trojan.Jorik.Skor.bmk << Back

Recommendation to Automatically remove Trojan.Jorik.Skor.bmk


Our products can remove Trojan.Jorik.Skor.bmk and thousands of other Virus and Spyware automatically and instantly.

Trojan.Jorik.Skor.bmk Details


  • Category Trojan
  • Discovered 7/7/2011 7:20:52 PM
  • Modified 8/1/2023 4:13:57 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
27061bde1326fa6e2226557021bcae4f.vxe.exe 160256Sun Microsystems, Inc.2.0.0.327061bde1326fa6e2226557021bcae4f 
51a23b33e0b268b79230b1f7d713afa3.vxe.exe 160256Sun Microsystems, Inc.2.0.0.351a23b33e0b268b79230b1f7d713afa3 
0b7617377b1970069794f72e707aa899.vxe.exe 160256Sun Microsystems, Inc.2.0.0.30b7617377b1970069794f72e707aa899 
565979fe738e5700155879b4cb0390f7.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3565979fe738e5700155879b4cb0390f7 
8387090a36a3d8406903ab6d90b975d6.vxe.exe 160256Sun Microsystems, Inc.2.0.0.38387090a36a3d8406903ab6d90b975d6 
7fa0ce2f1eab5b70129a53eacf69392c.vxe.exe 160256Sun Microsystems, Inc.2.0.0.37fa0ce2f1eab5b70129a53eacf69392c 
6d56df649cb5833b192b191d14feacd4.vxe.exe 160256Sun Microsystems, Inc.2.0.0.36d56df649cb5833b192b191d14feacd4 
a40fabbd2340488996806d0cb7108875.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3a40fabbd2340488996806d0cb7108875 
70c57552f0de3dd6614e73c6eadd557d.vxe.exe 160256Sun Microsystems, Inc.2.0.0.370c57552f0de3dd6614e73c6eadd557d 
f85ae91b43e9b873c1f9b042fd59a3edc404d0d94ab237fb2cc7065f09a0d377.exe 160256Sun Microsystems, Inc.2.0.0.39d2cae13518d0c250628c33ef875b6e1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware