Home / Spyware Encyclopedia / Trojan.zusy.308064 << Back

Recommendation to Automatically remove Trojan.zusy.308064


Our products can remove Trojan.zusy.308064 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.308064 Details


  • Category Trojan
  • Discovered 10/25/2024 5:50:42 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
80a93ffdf2f536d501cb267e33455bcc.exe 680511  80a93ffdf2f536d501cb267e33455bcc05/10/2023
8d1600e6c6bb2a4ee7372a877515acc0.exe 680455  8d1600e6c6bb2a4ee7372a877515acc005/10/2023
c9cdf9326ddda0e1cf2754a4a0f78cfb.exe 680455  c9cdf9326ddda0e1cf2754a4a0f78cfb05/10/2023
d917ff8768492311ea01a28a57cca3cc2392bb3b8154c51869cc57af417a1be4.mrg.exe 680451  dfe6428d3280c116d4b37d064060595a07/05/2024
2b95ad085d541e15596bbb3a777535d0.vir.exe 680511  2b95ad085d541e15596bbb3a777535d025/09/2024
06d4dc797599d22e8c1213d932518dc748fcdb2d059d54e2852953140f32473c.mrg.exe 680511  4a17e34112b89948528b4d37daf6c7fd21/09/2024
5e1b5a106518d7d614120ce21d778b1690373a7c6abf7d97f97fb326eea5868b.mrg.exe 680603  99c3273adb9c4edaafd05102ef478f6a09/05/2024
da8b3fd687cffd55bdeabac1f3f7373503249f4c179c5347790628fe5c5cf83a.mrg.exe 680455  e877e8676370c9b2c6483da6be02a41d09/05/2024
5faa69277ff180ce40ba2712a459156f2e90b362fb76af089aa48511ae330f5b.mrg.exe 680455  cdd65276cc095911a95e386ac497e8b302/11/2023
e6d539c9a41c5e340d3955f91f24c2aab98e6d4d10fe081cdc86996d26867091.mrg.exe 680455  e3800d2a9fde750fae28d0ffc850fe4d12/09/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware