Home / Spyware Encyclopedia / Trojan.zusy.308064 << Back

Recommendation to Automatically remove Trojan.zusy.308064


Our products can remove Trojan.zusy.308064 and thousands of other Virus and Spyware automatically and instantly.

Trojan.zusy.308064 Details


  • Category Trojan
  • Discovered 10/25/2024 5:50:42 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c9cdf9326ddda0e1cf2754a4a0f78cfb.exe 680455  c9cdf9326ddda0e1cf2754a4a0f78cfb05/10/2023
2b95ad085d541e15596bbb3a777535d0.vir.exe 680511  2b95ad085d541e15596bbb3a777535d025/09/2024
2fa512b241e7876be16e791e4a800d0c6840800f34224fc4259ffdeda5f76e45_sample.bin.exe 680451  a9ca3873639113428016baa9f4f9cb8820/08/2024
c61189baaf29996d9f1374cebf0e1dca32aef6eb6a98bbc6de42e8f9413e363e.mrg.exe 680603  84f00dfeee16f5a7542ee095ef20c3f719/08/2024
3ae8c3c5461392939f7d3ceaa93af9e0.vir.exe 680511  3ae8c3c5461392939f7d3ceaa93af9e008/08/2024
b8fa3a5343598b6ec487d7bd6b7e7a255ef33994a7061f63476fe1c1f9a51ca1.mrg.exe 680511  50ca4ed69312710cb3d234979df92bfc08/08/2024
ccca6cd570e4f33fa40dc9b3d049454013a04ecc.bin.exe 680455  04d55b7bf4adc5b21d015c616c0a27e517/07/2024
4292b184ae5d7605d44fa8cf4bc84a3f39ec0bf0.bin.exe 680455  652431b76c1b52661cd4b53c760376d429/05/2024
4ca6f2a9173fddce6ad57477161f3ba6d29ad39193f904e2cd6df449b824eed3.mrg.exe 680511  99de378c6957f846c142e553b21b713322/05/2024
b5744c17c05231a5419a988361772d8e2af5bc0c.bin.exe 680511  b5241d415056d6edf1e84808afe82a2706/05/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware