Home / Spyware Encyclopedia / Trojan.Vucha.dc << Back

Recommendation to Automatically remove Trojan.Vucha.dc


Our products can remove Trojan.Vucha.dc and thousands of other Virus and Spyware automatically and instantly.

Trojan.Vucha.dc Details


  • Category Trojan
  • Discovered 7/31/2018 3:42:30 PM
  • Modified 10/11/2024 10:54:08 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a7bd0c65da5ff124ba375d534cab91a9.exe 107008Microsoft Corporation12.0.6606.1000a7bd0c65da5ff124ba375d534cab91a9 
aa220038f6312256b9c650d89fe0a55a.exe 390144Oracle Corporation10.4.0.20aa220038f6312256b9c650d89fe0a55a 
b3a18e313c8a4305e6f69ef2ad1041f4.exe 420352Nullsoft, Inc.5,6,3,3234b3a18e313c8a4305e6f69ef2ad1041f4 
b4a32e9f42e7f214a7354f8cfc346e28.exe 477696Microsoft Corporation11.0.5721.5262 (WMPb4a32e9f42e7f214a7354f8cfc346e28 
b55eb3730285d3758c48ba1d6659f0eb.exe 325120  b55eb3730285d3758c48ba1d6659f0eb 
b5a453d78152fb33df80b361207c39f3.exe 243200NirSoft1.33b5a453d78152fb33df80b361207c39f3 
b8791b2c9dd035fc1e254c903ec99912.exe 82432  b8791b2c9dd035fc1e254c903ec99912 
b5856415c5079219658d591fd7db8fff.exe 399872Nullsoft, Inc.5,6,3,3234b5856415c5079219658d591fd7db8fff 
b8a9dfba9198e9f953cd49f53346eca2.exe 260175VMware, Inc.9.6.2.31837b8a9dfba9198e9f953cd49f53346eca2 
b8e65fb1e3e27af7c2169515592f151d.exe 305152Ashampoo0.0.0.0 alphab8e65fb1e3e27af7c2169515592f151d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware