Home / Spyware Encyclopedia / Trojan.zusy.308064 << Back

Recommendation to Automatically remove Trojan.zusy.308064


Our products can remove Trojan.zusy.308064 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.308064 Details


  • Category Trojan
  • Discovered 10/25/2024 5:50:42 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c9cdf9326ddda0e1cf2754a4a0f78cfb.exe 680455  c9cdf9326ddda0e1cf2754a4a0f78cfb05/10/2023
4292b184ae5d7605d44fa8cf4bc84a3f39ec0bf0.bin.exe 680455  652431b76c1b52661cd4b53c760376d429/05/2024
a48bddb84aceb6e0d81c72b2e1d6eb22a6a0379a.bin.exe 680393  f7ed3a413e099c1bcfd286bb6ce29a1517/07/2024
a14861941ad6ba45051b9abd1a1d281fa36de3f7.bin.exe 680393  d834f287fa15655a6ce10a50c70437f219/07/2024
9c1f7c16a45806237521fc66d88eb1f319de3c205a06714eb2c30eb9b6f55af3.mrg.exe 680455  b418b95122688fbfad847605f39e551522/08/2024
2b95ad085d541e15596bbb3a777535d0.vir.exe 680511  2b95ad085d541e15596bbb3a777535d025/09/2024
b5744c17c05231a5419a988361772d8e2af5bc0c.bin.exe 680511  b5241d415056d6edf1e84808afe82a2706/05/2024
897a5ba1cc20b9cee1fe0e371b9e82e07a6e8de9174a049a7ad96e17b8ddf074.mrg.exe 680393  36d2aca050a70f85ade8760b46fda41c02/11/2023
85d399c5c10a3fb1a7cc402e3a610708accbdcc69ee0831514b50dd295645ae5.mrg.exe 680393  271596bbed7996cf721e47c687ba698502/11/2023
7c3479cc89bd5f18631669580039b50b160e3c568073287709cede6ec4a9014a.mrg.exe 680511  2b376622e0037eb95c6b485b15203bed19/10/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware