Home / Spyware Encyclopedia / Trojan.Jorik.Skor.bmk << Back

Recommendation to Automatically remove Trojan.Jorik.Skor.bmk


Our products can remove Trojan.Jorik.Skor.bmk and thousands of other Virus and Spyware automatically and instantly.

Trojan.Jorik.Skor.bmk Details


  • Category Trojan
  • Discovered 7/7/2011 7:20:52 PM
  • Modified 8/1/2023 4:13:57 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e14dfe996a8f30cddb1804ca6b21feac.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3e14dfe996a8f30cddb1804ca6b21feac 
c974efec66ecae8b25567642ba39c4c3b014d441.exe 160256Sun Microsystems, Inc.2.0.0.31ed56061b0c61fbd9706532263dff37d29/04/2020
f44d0fa55e46790b2c981bb6f0ad1147.exe 160256Sun Microsystems, Inc.2.0.0.3f44d0fa55e46790b2c981bb6f0ad114713/07/2023
13477e13bee98a8c9620e0d765c35882a342996ef13134fc368f35dec8a4d07330631349fc29569c2ff03143ebaed577fc80b95df2938f0bff152c2ca8632f63.exe 160256Sun Microsystems, Inc.2.0.0.3d8de0ed0ed29ba49a71fd843e348151d18/07/2023
4dfe5ae2e9ac8b5ca71c8fafedfa6ed9.exe 160256Sun Microsystems, Inc.2.0.0.34dfe5ae2e9ac8b5ca71c8fafedfa6ed926/07/2023
a84a851b9ce7edb651485b999a186abcd23a63500e733e18c4490c12d2b6ba45.exe 160256Sun Microsystems, Inc.2.0.0.3e97a806a6e1d39f6ef0172f1cda9e0f2 
1653450132751d29986fd2df15e8867725dafd1dc577bea3f2ef0252b821f8327692ae488a3cffc79dcd2b3d429aa.exe 160256Sun Microsystems, Inc.2.0.0.3bcbcf7bb4003a4f367225e9bb6235adf 
113607017140183f5d1b42baed094b4976ee2694889622603b06e15d677aab4ac35bea3948cccd7ac5ded64ef7f16.exe 160256Sun Microsystems, Inc.2.0.0.30b64e820aaba3b5889fc76fe55792b50 
2d23b706501260b9cd82af363c1f43763e9daa42f531a57226220bd3aeca0895.exe 160256Sun Microsystems, Inc.2.0.0.3e27e5373a23db6eee72b0e299097ad54 
f85ae91b43e9b873c1f9b042fd59a3edc404d0d94ab237fb2cc7065f09a0d377.exe 160256Sun Microsystems, Inc.2.0.0.39d2cae13518d0c250628c33ef875b6e1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware