Home / Spyware Encyclopedia / Trojan.Blamon.uza << Back

Recommendation to Automatically remove Trojan.Blamon.uza


Our products can remove Trojan.Blamon.uza and thousands of other Virus and Spyware automatically and instantly.

Trojan.Blamon.uza Details


  • Category Trojan
  • Discovered 10/25/2024 5:41:02 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan.win32.blamon.dll.exe 1245371  70a18fcc8b5a501fd291c8234f537fb213/12/2023
trojan.win32.blamon.uza-396f5644647f88e546031cbea717246244b3ca92b76a78fed54f8202472ba983.exe 10611442  ca820b8e9f40e2b89847f47eca74ebfa15/12/2023
94bf21d7f6afba61b86afe3a4be7e286.bin.exe 5574073  94bf21d7f6afba61b86afe3a4be7e28623/02/2024
726695a7581e06e1c0e48a930eda30b7.bin.exe 5494683  726695a7581e06e1c0e48a930eda30b727/02/2024
32c927d7eb9cf066aeba15330673112d.bin.exe 2599935  32c927d7eb9cf066aeba15330673112d27/02/2024
9de7331de57f6c0df6a5162b1e5f7bc11c42b714.bin.exe 573009  c2a63e201c604e65f66f53a8718f95a227/08/2024
ceaec496ae26362be70498a42703f69343f8d86be5f658b70bf279e88de34e50.mrg.exe 789168  3333646e81b2fe64d43bf5729532664c03/09/2024
f8c2cb7748580b29d820d68f8275e1737150c3ba.bin.exe 723177  d3dde36b81a259f15a660f869d10001e03/09/2024
62e5c303618f1a39c760710bd5b0603c.bin.exe 871481  62e5c303618f1a39c760710bd5b0603c04/09/2024
78e20d3b646e740a4e49f3909283e46a98967c6cff8d2866a546544c39944aad.mrg.exe 789518  f39bc9aad9083277c55ad53a196e87fa10/09/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware