Home / Spyware Encyclopedia / Trojan.bulz.948974 << Back

Recommendation to Automatically remove Trojan.bulz.948974


Our products can remove Trojan.bulz.948974 and thousands of other Virus and Spyware automatically and instantly.

Trojan.bulz.948974 Details


  • Category Trojan
  • Discovered 10/25/2024 5:46:41 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
82ef1225ca6b29ed7500e1cdf83685dcfd60d126da5cffb17221fcfc8a7a691f.exe 1094656  0f1a2e39ded97842a5b3b0b432708ce930/05/2023
27a591d8421974b0ae0011db4f936bb2b6937a5647dbd4272197a737e0dd050d.exe 982869  181c8c31d173d22a7f43b6871ddce3dd29/11/2022
057584f419a48bc4f7264b9a89f180602c50ad29ab498154a53b7e6e71306358.exe 1027878  d55a4bdc2a80e21b15f79ab6a7d861a308/11/2022
25d13157736438c947306d540152615c.exe 1082454  25d13157736438c947306d540152615c21/09/2022
7e0cd01d4bd9d902ed27dc81a73ba055.exe 1043925  7e0cd01d4bd9d902ed27dc81a73ba05516/09/2022
5fe115858c58a90f803104dd9f93e114f7b374f87fd9f2ed3225cca8b8b32bdb.mrg.exe 989787  6553126ff1ca021427c76fe57b22775715/07/2022
2a34a42874e3c015b37d2920b19d4c8ce9d40a1df914d94da3d668a3a39dc9b9.mrg.exe 781312  5d34eb1bc6b92c3657397e78174bb2c624/05/2022
b8c57168bc070bc1ffca53a757bcbb354de66ee3.bin.exe 1094238  d58159f6c791f31c2ff5f71dadc1d2cc30/05/2023
c3d9b473b9a91f78fb365bbd134d6f10d9efa9ae.bin.exe 1089862  6f6098fd08c7289c027ed844c0e8f9fc24/03/2023
15fbdfd178002342c5587cea6e14e98e70c7c0af401b83c07d7e7f78e4816b1b.exe 1902400  b872a95069291816af9e6154b7e94ad416/03/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware