Home / Spyware Encyclopedia / Trojan.bulz.404832 << Back

Recommendation to Automatically remove Trojan.bulz.404832


Our products can remove Trojan.bulz.404832 and thousands of other Virus and Spyware automatically and instantly.

Trojan.bulz.404832 Details


  • Category Trojan
  • Discovered 2/3/2023 11:35:28 AM
  • Modified 2/3/2023 5:40:08 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0d73d1ae9e320f6d96c198d0544971e21ef3357b.exe 860888  90cb39d27dc0e85a911328646e9e47d721/04/2021
254a8166ae1eba1583d81c8771eb2cef92eacb12fbe420e5259deab1730bfcd3.exe 841432  e783945bade4a1bf00a5ddb750c170c205/06/2021
56d74d338ba39ea3930f4f5350cb309418fda6d65058156782126d3ba15eedb1.exe 860888  7d5bd642dab3fd92fd03fd0afe53fac712/06/2021
04848550ee24382c3e9997b4de3ada1d.exe 860888  04848550ee24382c3e9997b4de3ada1d02/06/2022
8705928a077ce5ff8e7957f13884f9cdadf74e891eda288ac7177fb4d0771964_sample.exe 860888  3673629ad313eb6425ad9491b71b26c718/06/2021
582b8fac5ddf91d9bbdf4024da4aa89a1e02ce31d0a01fd9404d7b99c68fbb80.exe 860888  780bf72ea4c7d2ebd58654157029040f18/06/2021
8180c5770ce9cfbf7fb115130b2f73c2ad77c1057e40862f4e959d4a1359308a.exe 860888  23607bc5edffd1e3a68663ef004fa8e015/06/2021
17613fcc482cebb3c1b47009d7209ce9cb69cc66f49a548a4ce6b0947e781301.exe 860888  f1dc489fc0e100611fb58cc289d1d49911/06/2021
cf3ea42e37c8efc0e90f48f122eb5a41.exe 841432  cf3ea42e37c8efc0e90f48f122eb5a4109/06/2021
e69c05b066036e8373c388af5e9b5caf0d37db7ab518d9b1b063deaaaf42ec2d.exe 860888  52ead8891ba36f49343cdb671bcf6da903/06/2021

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware