Home / Spyware Encyclopedia / Trojan.RelevantKnowledge << Back

Recommendation to Automatically remove Trojan.RelevantKnowledge


Our products can remove Trojan.RelevantKnowledge and thousands of other Virus and Spyware automatically and instantly.

Trojan.RelevantKnowledge Details


  • Category Trojan
  • Discovered 11/26/2014 5:56:47 PM
  • Modified 3/28/2024 11:34:19 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
73882e422ce4719ef332f23ff93abd24.vxe.exe 405508 3, 0, 0, 573882e422ce4719ef332f23ff93abd24 
14033306561fa07680c61e47d6393c1ab566ce5df02c90436f423e36ab158b04f392840df9850e7b1e9ccc59a2625.exe 1660416TMRG, Inc.1.3.319.378 (Buildcf26e6ea80bec47656c745237f0572a4 
65b6ba82d5302b9281ccab661c6911d8a333c76007d5ee21d87a4371c76e2642.exe 385024T M R G , INC.0, 2, 3, 1737d823c34c3b78890845386cc43cdbd4 
vcdcuttersetupd.exe 3100686vcd-cutter.com1.00e78aa1bcf42ba58c9fcde2ff5ddb40d 
1fe612fe0f9eb8dd9c9a21b436d70637d61c274fdbd52ae364c0e602b0eb0250.dll 226368VoiceFive, Inc.1, 2, 323, 1a5976ee83be94814e5532ca2de9602c3 
d2cfae108217cf3d3099ebf6a759038337cd38f7.bin.dll 226328VoiceFive, Inc.1, 2, 323, 1b24e8e36f6a036a98dee9dcdc74fa56a 
18002201422e8b445b735f61c899579c57d65279a3d9ca0068450747a1d6449bca9fa25fef8d480b4e9d287e02a77.exe 4471408A Software Plus1.0a7151ffd0bd095d82f374dfdbc41e3fa 
83795e4d93c35ea1aac1f47e2e1da342.vir.exe 512000  83795e4d93c35ea1aac1f47e2e1da342 
0bb04a4668530c0209599a642ac83415.vir.exe 209504  0bb04a4668530c0209599a642ac83415 
484be4a6c4a6cf669fe38f6588b4155b.exe 2460397  484be4a6c4a6cf669fe38f6588b4155b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware