Home / Spyware Encyclopedia / Worm.Juched.fih << Back

Recommendation to Automatically remove Worm.Juched.fih

Our products can remove Worm.Juched.fih and thousands of other Virus and Spyware automatically and instantly.

Worm.Juched.fih Details

  • Category Worm
  • Discovered 9/8/2018 12:25:57 AM
  • Modified 6/20/2019 2:16:13 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
..\Extracted data\D2-15,16\2013-02-11_7789\6f63377d38ac496c13e5150b32b847aba20b609a112c85dce485a77ddf6419b5.exe 201348
..\Extracted data\D2-18,19\2013-02-15_184\c849f651b0cadc9fc385bcea363676569dde40a91165024a0013d4458fa2f3f2.exe 204800
..\CymruDownload\Feb\18\malware.2013-02-18\c22e0640d1da57b1d941b60c031c4aca4bcea3eb.bin.exe 204800
..\CymruDownload\Feb\19\malware.2013-02-18\f1ab97048df20855f3ee9378a072de2e8a16c831.bin.exe 204800
..\Extracted data\D2-18,19\2013-02-15_184\c849f651b0cadc9fc385bcea363676569dde40a91165024a0013d4458fa2f3f2.exe 204800
..\CymruDownload\Feb\18\malware.2013-02-18\6df9c38850bc2dde5742f7603a6f39c225ee902d.bin.exe 201000
..\CymruDownload\Feb\18\malware.2013-02-18\60d5826b0fb77527d8632f06f3d88bfb7c5ead94.bin.exe 204800
..\Extracted Data\Sunbelt\20130223\sample_2013-02-21\e20aab6d53de967c9db537481d332b25.exe 201373
..\SandboxDrop\20130223\files\recycler .exe 201252
..\ExtractedData\ExtractedData\Cymru\malware.2013-02-27\cf1ee3d349d2eaf9b45b2298ff1900ee6b5cd467.bin.exe 201078

The following Registry Entries were created:

Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware