Home / Spyware Encyclopedia / Trojan.zusy.308064 << Back

Recommendation to Automatically remove Trojan.zusy.308064


Our products can remove Trojan.zusy.308064 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.308064 Details


  • Category Trojan
  • Discovered 10/25/2024 5:50:42 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0307036bd8710bec38f3599b89eb0634f1e28f62548c75eb59d96996ac386abd.exe 680511  3005b2b37759b499794684d7ea7b13f030/06/2023
80a93ffdf2f536d501cb267e33455bcc.exe 680511  80a93ffdf2f536d501cb267e33455bcc05/10/2023
c9cdf9326ddda0e1cf2754a4a0f78cfb.exe 680455  c9cdf9326ddda0e1cf2754a4a0f78cfb05/10/2023
33ca9d45c24d4a6695d43e652916105f05fd5be2e33d20274d6fafdad5fb3e56.bin.exe 680455  19355e693bcf9efdb0377a6e997f980417/10/2023
85d399c5c10a3fb1a7cc402e3a610708accbdcc69ee0831514b50dd295645ae5.mrg.exe 680393  271596bbed7996cf721e47c687ba698502/11/2023
ad1ea355057b01d938cfa86fee6175757b4c1d60.bin.exe 680511  ae234cc6578d756b255a0200ccff599130/12/2023
b5744c17c05231a5419a988361772d8e2af5bc0c.bin.exe 680511  b5241d415056d6edf1e84808afe82a2706/05/2024
d917ff8768492311ea01a28a57cca3cc2392bb3b8154c51869cc57af417a1be4.mrg.exe 680451  dfe6428d3280c116d4b37d064060595a07/05/2024
ccca6cd570e4f33fa40dc9b3d049454013a04ecc.bin.exe 680455  04d55b7bf4adc5b21d015c616c0a27e517/07/2024
0657ec1d19e75c8f85b1401eb0e6b78eacf793dade482b03a024dc339ec5b95d.mrg.exe 680511  d993e485737f749d942647b54d9b95ce22/08/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware