Home / Spyware Encyclopedia / Trojan.zusy.408226 << Back

Recommendation to Automatically remove Trojan.zusy.408226


Our products can remove Trojan.zusy.408226 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.408226 Details


  • Category Trojan
  • Discovered 9/25/2024 9:57:25 PM
  • Modified 9/26/2024 12:08:38 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7ab8255b831f62c634b971a70ad026ab548e494da289ae4a35b505185a93729f.exe 94208  df2d41db6f5d65d9b4eac35fcaeb427629/03/2023
7104702706450dc0129c65b358b608767c60c13ecfa12ecabcebe2b9ed5a6f56_sample.bin.exe 91136  5dec8e670bfca60b76d4b2c4846c8cdc03/09/2024
dc0feb410d6da97c6a1c01ddc909f5c3.exe 94208  dc0feb410d6da97c6a1c01ddc909f5c329/03/2023
1104a941a5a077026e6f176e944a1ade.exe 94208  1104a941a5a077026e6f176e944a1ade29/03/2023
0ffd2159240deefd41db6a2e661abac2.exe 90112  0ffd2159240deefd41db6a2e661abac229/03/2023
5c2485a7a5a4cb49f5cfe214bb012ad4b498b561.bin.exe 87040  778bb400c41bb03dd59812ffcaac7aea22/03/2023
d919726bcc4216e9d8e898e6c33f7ee0dca85304f191642489d709cff3a72341.exe 94208  e86acfafa36f626b425652d8c530fbcc21/03/2023
6b170f6a6a29d3d5e3e7d1101a0ea52aae190615e3fe97c1a26c788e101690ee.exe 94208  2f637e9ea79bb9efaab7f99d04c5f98c21/03/2023
737e45388f88317e3134d532e4acb8f3017493bf.bin.exe 91136  f70bb3531008b7f196ecced5c33ef33921/03/2023
52ac93449d559a9c919e313bdb50cbe02aea037e262fecd868a5637ded2e14b1.mrg.exe 87040  adc790b0d8358979daee827aba76db0612/02/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware