Home / Spyware Encyclopedia / Trojan.kazy << Back

Recommendation to Automatically remove Trojan.kazy


Our products can remove Trojan.kazy and thousands of other Virus and Spyware automatically and instantly.

Trojan.kazy Details


  • Category Trojan
  • Discovered 10/10/2013 8:55:54 AM
  • Modified 4/8/2024 10:29:35 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c7d52aea52cb62c0850b7274e0a64b24e9b0d617ab6768bb0274dc900095a309.exe 22372  b5783e1322d074c002429cbb584ae3cc 
e5cec35e1f58d2e8ad09f6769755528d39c6aca6.bin.exe 1679360  d4f83e10a1675c3caa3f985c1b2186ea 
6235acdf160af8541f2b5fa2a68c4be85c6d1a92.bin.exe 97792  688cac3392d059ae905bdade101553b5 
d5ab90f7f8515ba9cea464eb189d6e1d4f8b6d385567350a07401e726a6b33aece0a7b8b38dc728e882b182025934e0ae51.exe 245817  d98d3579ee6c7705e3693650bfc94d97 
cce8fa48554d69a2fc2045476d6adc1e2b994109111f950813fc7ea12b24f63ff627597a51e3de0d04c4b0425e8f5dba341.exe 1671680  aacd72666c03dc46a52faed9a50e2330 
185725ed30492eb209735b9f5be7be43.exe 204605RealNetworks, Inc.6.0.11.853185725ed30492eb209735b9f5be7be43 
6b0da4767a5aab8ac75bc251a3196e2f4536a91b0d162a2f3792030f23395dd6.exe 228864北京数据中心1. 0. 0. 13f940e76e6641b1759dedfca99cde6b7 
52bea27be80773bf085c7eb9e184c866a3bba8a96bdd62628a2acbfbe04ecca6.exe 142248  2200053f4441490b8eddb75eabd343ab 
11c6b96ba79662e680d73ea20a2a3b75e406e5aab7dc11fd743ffb90299f4c37.exe 14937  b5e56bda734cea625859c7289bbec74b 
07b86a6086d516c199ec78f26186d870247e7b556122d8ff9e92d3ba71411bab.exe 39424Microsoft Corporation1, 0, 1526, 0736f635a1cacd2d4dd029751ac1022c3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware