Home / Spyware Encyclopedia / Trojan.zusy.262356 << Back

Recommendation to Automatically remove Trojan.zusy.262356


Our products can remove Trojan.zusy.262356 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.262356 Details


  • Category Trojan
  • Discovered 3/12/2018 1:28:36 PM
  • Modified 3/14/2018 4:59:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e9f400246c217939bf7b0cb22c6fe216.dll 257024  e9f400246c217939bf7b0cb22c6fe216 
fb3d5aa644d94eddc6472099cc686666.dll 257024  fb3d5aa644d94eddc6472099cc686666 
103ed835f173f49059b6edc57587554dc531713bc386166de999db6c9ce041a3.dll 257536  cd19106b9795f54bda7574c346d96d53 
4c306d212e3f74c97cef2ec61973e921f8bcd8e2333ae39f143c31c049ef8370.dll 257536  adf7bb3eda39f4a7eab2856cba3f7d27 
34d768ddac1a4955d68c00634a3ac293b1566d005a0320108a0b463e7da68417.dll 257536  6e6274509a39a5ce49be3df2493c384d 
8363e1b79d167e47e3eb2162e643d77b90523a9e3de5cc30dc5766d08cbac270.dll 257536  d6464d014223f0eacbc06539c6f5d5c2 
1efd4c8b5f160a62e586981a209fc247a84cff81d631dc9a8fe350f9e95afa93.dll 257536  06edbc99164bc7f0e1f7c6343a8d2e59 
73bb165dba34db945f24355e643db2508fd334e85b00100d01d525b7fd613582.dll 257536  2d347c5569d448ee8764e5a36b94f6b7 
6e49e6202077e9e37355877ebc97547cd90b2b8928d878704575ca5cf7f71203.dll 248832  c86c2ad30dfbbcfebb0b52754f44e73e 
6e5d7dc705cc38aaae1527f842c04046a3d07709709387ec6dd2e98256a4306e.dll 257536  681eb945e617153bb61e6a3176ad802c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware