Home / Spyware Encyclopedia / Trojan.Temr.pgb << Back

Recommendation to Automatically remove Trojan.Temr.pgb


Our products can remove Trojan.Temr.pgb and thousands of other Virus and Spyware automatically and instantly.

Trojan.Temr.pgb Details


  • Category Trojan
  • Discovered 8/30/2017 4:09:20 PM
  • Modified 7/31/2023 10:24:47 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6d23047a0a9cbbf2406571b268a8bb41.vir.exe 126976360互联网安全中心2, 1, 0, 10126d23047a0a9cbbf2406571b268a8bb41 
virusshare_4c070d7c77ba700c74059afc3610c30d.exe 126976360互联网安全中心2, 1, 0, 10124c070d7c77ba700c74059afc3610c30d 
b24a42c6d950fe76fb4b3d7897fcfb55.vir.exe 126976360互联网安全中心2, 1, 0, 1012b24a42c6d950fe76fb4b3d7897fcfb55 
bb615766df6edc1a44ab760973c0c899.vir.exe 126976360互联网安全中心2, 1, 0, 1012bb615766df6edc1a44ab760973c0c899 
6561fe26147b7ce19ea1c94b8b8bef7c.vir.exe 126976360互联网安全中心2, 1, 0, 10126561fe26147b7ce19ea1c94b8b8bef7c 
4b907d03279955c555822d7cb52ed0c0.vir.exe 126976360互联网安全中心2, 1, 0, 10124b907d03279955c555822d7cb52ed0c0 
e2d51b5800311806dbda38aed5080903.vir.exe 126976360互联网安全中心2, 1, 0, 1012e2d51b5800311806dbda38aed5080903 
cfa76d37d7957d2fd16b94c01dbc32f6.vir.exe 126976360互联网安全中心2, 1, 0, 1012cfa76d37d7957d2fd16b94c01dbc32f6 
1957340796248a701f45f61b9dc229f15317d27d10b71a7642b09a4bc7b3ad318577e323f8d4eaa075aa8c745f1b5.exe 126976360互联网安全中心2, 1, 0, 1012ac40be842842b0855634796a0c8971fc 
145625029649912ee330533a3368224b31ea7129234177496bcc9340e96ef7a738127c9f7295864547edb7539e71d.exe 126976360互联网安全中心2, 1, 0, 10126aea5ae4ae27772cd60139847694dbb4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware