Home / Spyware Encyclopedia / Trojan.RelevantKnowledge << Back

Recommendation to Automatically remove Trojan.RelevantKnowledge


Our products can remove Trojan.RelevantKnowledge and thousands of other Virus and Spyware automatically and instantly.

Trojan.RelevantKnowledge Details


  • Category Trojan
  • Discovered 11/26/2014 5:56:47 PM
  • Modified 3/28/2024 11:34:19 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bundleinstall.exe 118784 1.0.0.43a9a6295ab6e6ce9f26e34353cb582c0 
c82ea4f8a009e5a6f189578f9da0a59f.dll 226368VoiceFive, Inc.1, 2, 323, 1c82ea4f8a009e5a6f189578f9da0a59f 
94a54c469442b5dd83431e2f5b571d8b.dll 348160RelevantKnowledge4.0.3.39 (Build 3.394a54c469442b5dd83431e2f5b571d8b 
47dc8debe1882968cfa224e691f9af25 275072  47dc8debe1882968cfa224e691f9af25 
vcdcuttersetupd.exe 3100686vcd-cutter.com1.00e78aa1bcf42ba58c9fcde2ff5ddb40d 
f0c9301a1b9bcfff4c894e671a072a1360cb7d4a.bin.exe 204352VoiceFive, Inc.1.0.6.1 (Build 6.1)bba2d7df2a9b21ed2f5ffa32ebcba90f 
c531f449aa9c67882b43056e29c757580e2e23ac.bin.dll 226368VoiceFive, Inc.1, 2, 323, 1ff6a9b38716ab81117655132165265f6 
4aa05aac0545b31e0abbf77c86cc78fad4b70fce.bin.dll 226368VoiceFive, Inc.1, 2, 323, 11c54d270b547f33363ddf5b342e134f7 
1fe612fe0f9eb8dd9c9a21b436d70637d61c274fdbd52ae364c0e602b0eb0250.dll 226368VoiceFive, Inc.1, 2, 323, 1a5976ee83be94814e5532ca2de9602c3 
d2cfae108217cf3d3099ebf6a759038337cd38f7.bin.dll 226328VoiceFive, Inc.1, 2, 323, 1b24e8e36f6a036a98dee9dcdc74fa56a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware