Home / Spyware Encyclopedia / Trojan.Blamon.uza << Back

Recommendation to Automatically remove Trojan.Blamon.uza


Our products can remove Trojan.Blamon.uza and thousands of other Virus and Spyware automatically and instantly.

Trojan.Blamon.uza Details


  • Category Trojan
  • Discovered 10/25/2024 5:41:02 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
78e20d3b646e740a4e49f3909283e46a98967c6cff8d2866a546544c39944aad.mrg.exe 789518  f39bc9aad9083277c55ad53a196e87fa10/09/2024
e2d20fcc069258e5700d0dfd35d63c8ba9d7d40c28de2ba1ad48b080adbf1e14.mrg.exe 1073239  b0715918fb7dc26eacbdb3ac63849bd112/09/2024
6db934ae41977038392b21fdbf5a4731.bin.exe 1137750  6db934ae41977038392b21fdbf5a473112/09/2024
af663e35fd6cb529a7e2aaa049704e0dd3855cb24241368dda12731d9a537c99.mrg.exe 1022866  8e90c2b6b10c4bbc12245a12f609be9321/09/2024
077a3c85fb257f2e200fa93d527c3e9c.bin.exe 1379440  077a3c85fb257f2e200fa93d527c3e9c07/10/2024
eb74caeed749e9b092b62758b574e76bf99c88b9292e71e3b5aa397a4ae33240.mrg.exe 1389120  c02782fb81d0d19562260d20678860ae11/10/2024
8fbfb9e466ad6a1b9ea9724418ed41f1f02779b70b794da923296c3d615d9cac.mrg.exe 1204443  f9577d75f10188f6303bc7e653c65fea11/10/2024
94bf21d7f6afba61b86afe3a4be7e286.bin.exe 5574073  94bf21d7f6afba61b86afe3a4be7e28623/02/2024
e2d7eb2c2a99d4d7396534e02d1e989e5c9014c07de5de4606fafcca27f954b2.mrg.exe 1271737  bc47439572a65da11f79f88e9a25af5f22/10/2024
b74b52e789a8ed0e0b3beb2a49ebd66b93ee6e42.bin.exe 1348262  8fe36a054be0ddea6f030f0d7124637716/10/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware