Home / Spyware Encyclopedia / Trojan.TDSS.blec << Back

Recommendation to Automatically remove Trojan.TDSS.blec


Our products can remove Trojan.TDSS.blec and thousands of other Virus and Spyware automatically and instantly.

Trojan.TDSS.blec Details


  • Category Trojan
  • Discovered 5/1/2011 8:55:52 AM
  • Modified 8/3/2023 5:33:50 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
00c37632f6c0a0081dfc921ecef4ba81.dll 112640Burnaware Technologies3.0.4.000c37632f6c0a0081dfc921ecef4ba81 
155fa8ed80693d4d568c51dd14e1bfb0.exe 112640Burnaware Technologies3.0.4.0155fa8ed80693d4d568c51dd14e1bfb0 
155c09f223f068aa0ba3c909c9df8203.dll 112640Burnaware Technologies3.0.4.0155c09f223f068aa0ba3c909c9df8203 
86c7d40e50d8d06f8c41f6e05acd5f41e291fdc01670ba49c85959326b9c28f1 112640  01e0ff887402ce546a9b8927dbf1d383 
9a90d18901709e1e6906c9ab8c54c860.exe 112640Burnaware Technologies3.0.4.09a90d18901709e1e6906c9ab8c54c860 
b7184aecddc510c9d602968fc422ed02.exe 112640Burnaware Technologies3.0.4.0b7184aecddc510c9d602968fc422ed02 
0c2796b6974ab1e311cf98b26f95c8c7eb3cf382d034a308844fe8bcdd4c2a8f.dll 112640Burnaware Technologies3.0.4.06b3b29bc1dd15618799a0507c074f788 
1d9112e769de87bbb833c122abd49eca.vir.exe 112640Burnaware Technologies3.0.4.01d9112e769de87bbb833c122abd49eca 
9cda34cbb27202614f9fcf83916ebdf2.vir.dll 112640Burnaware Technologies3.0.4.09cda34cbb27202614f9fcf83916ebdf2 
288ec57626eaae06868582bd51d74517.vir.exe 112640Burnaware Technologies3.0.4.0288ec57626eaae06868582bd51d74517 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware