Home / Spyware Encyclopedia / Trojan.Trojan-FDUD << Back

Recommendation to Automatically remove Trojan.Trojan-FDUD


Our products can remove Trojan.Trojan-FDUD and thousands of other Virus and Spyware automatically and instantly.

Trojan.Trojan-FDUD Details


  • Category Trojan
  • Discovered 9/6/2014 3:01:42 PM
  • Modified 3/4/2024 10:11:01 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
964ce9c34679ff348ae0ea6ffc462212.vir.exe 918528avwu2LMiPNBpv13.17.22.88964ce9c34679ff348ae0ea6ffc462212 
15e1d6b09722d8ba3c0d0d18ac734a20.vir.exe 290816aTUdRONkWJWvK12.16.20.8015e1d6b09722d8ba3c0d0d18ac734a20 
e36db227682e35c69f3b68caf7b41d03.vir.exe 299008aypE0M1ZCjm64.5.6.26e36db227682e35c69f3b68caf7b41d03 
ced5a1061188b51130dcbbf29a8841a1.vir.exe 291840atoUgQIEJZk2.2.2.11ced5a1061188b51130dcbbf29a8841a1 
70d528c4abd081255cfa9d0a373331c5.vir.exe 430080apvznOK0mpTlq13.18.23.9270d528c4abd081255cfa9d0a373331c5 
5fc995124b14237613c78f630a9d3ceb.vir.exe 248832aHrRKTW5HSmZe14.18.23.935fc995124b14237613c78f630a9d3ceb 
3b75d133614cdeacfcdffa5362acf03e.vir.exe 742400a4zEVnyzQbV75.6.8.333b75d133614cdeacfcdffa5362acf03e 
59f0c907143cf31945a06e5e80da9992.vir.exe 381952aadIdlviACCXM12.16.20.8359f0c907143cf31945a06e5e80da9992 
b179006e326e6fbce5914f4a71776573.vir.exe 500736ap1Mon8EY6N3.3.4.19b179006e326e6fbce5914f4a71776573 
7348eb1a8f427f82e9e073a1ad881fa1.vir.exe 906240aBdMn9JNlT9gi12.16.20.827348eb1a8f427f82e9e073a1ad881fa1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware