Home / Spyware Encyclopedia / Trojan.Vucha.dc << Back

Recommendation to Automatically remove Trojan.Vucha.dc


Our products can remove Trojan.Vucha.dc and thousands of other Virus and Spyware automatically and instantly.

Trojan.Vucha.dc Details


  • Category Trojan
  • Discovered 7/31/2018 3:42:30 PM
  • Modified 10/11/2024 10:54:08 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b56cbfa03c6cd2f2f70fbc6eb3a5e7e7.exe 117248Microsoft Corporation11.0.5721.5262 (WMPb56cbfa03c6cd2f2f70fbc6eb3a5e7e7 
b5526e3ec6da68abba17511cbbe19a24.exe 498176Mozilla Corporation38.2.0b5526e3ec6da68abba17511cbbe19a24 
b38677b85dc32ae54d79ef6b85d9fdd8.exe 283465matt.malensek.net2.5b38677b85dc32ae54d79ef6b85d9fdd8 
b3cd429aba678ba4d601fcb1c588fa5b.exe 224412Ashampoo2.0.0.0b3cd429aba678ba4d601fcb1c588fa5b 
b3b3589668213c5a9a0bfeeb9afeb9d3.exe 283465matt.malensek.net2.5b3b3589668213c5a9a0bfeeb9afeb9d3 
b582c2a0eaa4ba028d40d442005d1e7e.exe 317440  b582c2a0eaa4ba028d40d442005d1e7e 
b59e2aa417ca76f6483b111896e2bd96.exe 329216MAJC Information Technology Co., Ltd.4.5.1.129b59e2aa417ca76f6483b111896e2bd96 
b8b94032b63b26e77f78ab34f7d26e99.exe 131072Microsoft Corporation6.1.7600.16385 (winb8b94032b63b26e77f78ab34f7d26e99 
b909f471d563eb92e6e3ff3829c9a8d4.exe 700928  b909f471d563eb92e6e3ff3829c9a8d4 
b8fe2ce3cac4cb59e209ba3b3a34ad9c.exe 433152Microsoft Corporation6.1.7600.16385 (winb8fe2ce3cac4cb59e209ba3b3a34ad9c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware