Home / Spyware Encyclopedia / Trojan.zusy.408226 << Back

Recommendation to Automatically remove Trojan.zusy.408226


Our products can remove Trojan.zusy.408226 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.408226 Details


  • Category Trojan
  • Discovered 3/31/2023 10:06:51 PM
  • Modified 4/3/2023 3:33:44 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d919726bcc4216e9d8e898e6c33f7ee0dca85304f191642489d709cff3a72341.exe 94208  e86acfafa36f626b425652d8c530fbcc21/03/2023
6ae00df7be71779a67127ffe9dec084d7c8a1198d0f9294fae2220642759a75d.mrg.exe 87040  16651b430cf92891155d35b331d4862803/02/2022
dc0feb410d6da97c6a1c01ddc909f5c3.exe 94208  dc0feb410d6da97c6a1c01ddc909f5c329/03/2023
1104a941a5a077026e6f176e944a1ade.exe 94208  1104a941a5a077026e6f176e944a1ade29/03/2023
0ffd2159240deefd41db6a2e661abac2.exe 90112  0ffd2159240deefd41db6a2e661abac229/03/2023
7ab8255b831f62c634b971a70ad026ab548e494da289ae4a35b505185a93729f.exe 94208  df2d41db6f5d65d9b4eac35fcaeb427629/03/2023
6b170f6a6a29d3d5e3e7d1101a0ea52aae190615e3fe97c1a26c788e101690ee.exe 94208  2f637e9ea79bb9efaab7f99d04c5f98c21/03/2023
7975f02ef2299d61e269c765cc6217a1.exe 2850818  7975f02ef2299d61e269c765cc6217a129/01/2022
5c2485a7a5a4cb49f5cfe214bb012ad4b498b561.bin.exe 87040  778bb400c41bb03dd59812ffcaac7aea22/03/2023
52ac93449d559a9c919e313bdb50cbe02aea037e262fecd868a5637ded2e14b1.mrg.exe 87040  adc790b0d8358979daee827aba76db0612/02/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware