Home / Spyware Encyclopedia / Worm.Juched.fih << Back

Recommendation to Automatically remove Worm.Juched.fih


Our products can remove Worm.Juched.fih and thousands of other Virus and Spyware automatically and instantly.

Worm.Juched.fih Details


  • Category Worm
  • Discovered 9/19/2018 2:26:44 PM
  • Modified 9/21/2018 5:22:15 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\Extracted data\D2-18,19\2013-02-11_4534\9a6326f5e389d84fe855d0fdd3c316a92ebda845797119b9efec70cf53f51666.exe 200974 6.0.150.347b727b9952d939c1b73d3d1400307fb
..\Extracted Data\Sunbelt\20130223\sample_2013-02-21\e20aab6d53de967c9db537481d332b25.exe 201373 6.0.150.3e20aab6d53de967c9db537481d332b25
..\Extracted Data\Sunbelt\20130301\2a4cbbd1cb11aab94a4ca95c76f0e7bb.exe 201338 6.0.150.32a4cbbd1cb11aab94a4ca95c76f0e7bb
..\Extracted Data\Virussign\20130228\virussign.com_20130228_professional\exe32\virussign.com_b1e0a2c2691c9a107fa006cb70a80179.exe 201084 6.0.150.3b1e0a2c2691c9a107fa006cb70a80179
..\Extracted data\D2-27\2013-02-20_4328\c709a80d0bf89aaad4448a6d6c9756daf4f4434b6cd0e7bb00a0836bd74c9fb8.exe 278583 6.0.150.3137bcd8c463590ecae17e6b10f4b9f43
..\Extracted Data\Virussign\20130226\virussign.com_20130226_professional\exe32\virussign.com_0749a67234b8a2f1b6976a4ea2dd6041.exe 201425 6.0.150.30749a67234b8a2f1b6976a4ea2dd6041
..\Extracted data\D2 20130225\2013-02-25_54\e04e2f826f93b254a904b394a7c90b7b04c7b50e3547c6c3fbcf66cbf1392340.exe 204800 6.0.150.3a7731ca0db51d298e281fd85291ee901
..\Extracted Data\Virussign\20130304\virussign.com_20130304_professional\exe32\virussign.com_d5ca93f537977aecfca96489ae445ed7.exe 201091 6.0.150.3d5ca93f537977aecfca96489ae445ed7
..\Extracted Data\Cymru\2013\malware.2013-03-05\098b121956ce95b0b24b2311c52e57b90a322501.bin.exe 275658 6.0.150.31194cb3949e95ed5e348271a44f944db
..\Extracted Data\Virussign\20130307\virussign.com_20130307_standard\exe32\virussign.com_c75527d325766e7e87454f3c2b50cfad.exe 200893 6.0.150.3c75527d325766e7e87454f3c2b50cfad

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware