Home / Spyware Encyclopedia / Trojan.Vucha.dc << Back

Recommendation to Automatically remove Trojan.Vucha.dc


Our products can remove Trojan.Vucha.dc and thousands of other Virus and Spyware automatically and instantly.

Trojan.Vucha.dc Details


  • Category Trojan
  • Discovered 7/31/2018 3:42:30 PM
  • Modified 10/11/2024 10:54:08 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
adba3ecf615c5fa53a5f017e1c000496.exe 180736Siber Systems7-9-15-8adba3ecf615c5fa53a5f017e1c000496 
b187b036713e8d6a4039e29117347a43.exe 248832WinAbility® Software Corporation9.1b187b036713e8d6a4039e29117347a43 
b19cf0b49531bce525f98d68a7d85052.exe 188416Siber Systems7-9-15-8b19cf0b49531bce525f98d68a7d85052 
b34e4a927c787078247be79d1a12055c.exe 418816Steganos Software GmbH17.0.2.11443b34e4a927c787078247be79d1a12055c 
b18d230e48e9e439778c259c3ec321d1.exe 248137Lamantine Software a.s.8.0.4.34b18d230e48e9e439778c259c3ec321d1 
b57449d84db4389c06d162f2f3b59372.exe 440832IObit5.0.3.0b57449d84db4389c06d162f2f3b59372 
b554b7f8df6da9d1767ed48bfe673291.exe 400384Alexander Roshal4.20.0b554b7f8df6da9d1767ed48bfe673291 
b909f471d563eb92e6e3ff3829c9a8d4.exe 700928  b909f471d563eb92e6e3ff3829c9a8d4 
b3ffcb0e54dc7c914750e99b3ffcbb5d.exe 622080IObit1.0.0.1b3ffcb0e54dc7c914750e99b3ffcbb5d 
bd7303070535b965ad25819724dcda59.exe 185344Cortado AG8,6,239,1bd7303070535b965ad25819724dcda59 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware