Home / Spyware Encyclopedia / Trojan.Jorik.Skor.bmk << Back

Recommendation to Automatically remove Trojan.Jorik.Skor.bmk


Our products can remove Trojan.Jorik.Skor.bmk and thousands of other Virus and Spyware automatically and instantly.

Trojan.Jorik.Skor.bmk Details


  • Category Trojan
  • Discovered 7/7/2011 7:20:52 PM
  • Modified 8/1/2023 4:13:57 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0b7617377b1970069794f72e707aa899.vxe.exe 160256Sun Microsystems, Inc.2.0.0.30b7617377b1970069794f72e707aa899 
565979fe738e5700155879b4cb0390f7.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3565979fe738e5700155879b4cb0390f7 
8387090a36a3d8406903ab6d90b975d6.vxe.exe 160256Sun Microsystems, Inc.2.0.0.38387090a36a3d8406903ab6d90b975d6 
70c57552f0de3dd6614e73c6eadd557d.vxe.exe 160256Sun Microsystems, Inc.2.0.0.370c57552f0de3dd6614e73c6eadd557d 
d46b3c39bb88a3412427badd05fb6a3b.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3d46b3c39bb88a3412427badd05fb6a3b 
e14dfe996a8f30cddb1804ca6b21feac.vxe.exe 160256Sun Microsystems, Inc.2.0.0.3e14dfe996a8f30cddb1804ca6b21feac 
f44d0fa55e46790b2c981bb6f0ad1147.exe 160256Sun Microsystems, Inc.2.0.0.3f44d0fa55e46790b2c981bb6f0ad114713/07/2023
6d56df649cb5833b192b191d14feacd4.vxe.exe 160256Sun Microsystems, Inc.2.0.0.36d56df649cb5833b192b191d14feacd418/07/2023
4dfe5ae2e9ac8b5ca71c8fafedfa6ed9.exe 160256Sun Microsystems, Inc.2.0.0.34dfe5ae2e9ac8b5ca71c8fafedfa6ed926/07/2023
31e76fd28807661b999310d0092fd400.exe 160256Sun Microsystems, Inc.2.0.0.331e76fd28807661b999310d0092fd40018/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware