Home / Spyware Encyclopedia / Trojan.Blamon.uza << Back

Recommendation to Automatically remove Trojan.Blamon.uza


Our products can remove Trojan.Blamon.uza and thousands of other Virus and Spyware automatically and instantly.

Trojan.Blamon.uza Details


  • Category Trojan
  • Discovered 10/25/2024 5:41:02 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6db934ae41977038392b21fdbf5a4731.bin.exe 1137750  6db934ae41977038392b21fdbf5a473112/09/2024
77ed4b44e96e2b9609822a42d50743c87a1b38b9bcc6269a888f6b054fe5b03b.mrg.exe 979224  df9f51efb146454bc5179a1ebf3de99119/09/2024
7254ff205acee3717ef7644bbde6be054007f9a6.bin.exe 1061939  f82bbd980ae5dab94ef6fb6fc42e25f121/09/2024
af663e35fd6cb529a7e2aaa049704e0dd3855cb24241368dda12731d9a537c99.mrg.exe 1022866  8e90c2b6b10c4bbc12245a12f609be9321/09/2024
eb74caeed749e9b092b62758b574e76bf99c88b9292e71e3b5aa397a4ae33240.mrg.exe 1389120  c02782fb81d0d19562260d20678860ae11/10/2024
640367f815932a1a99358e074bd0cedf3a53db82c8b5a56d7846b8f496fe5594.mrg.exe 1545758  8e84a56535412bd0c25cca88f016f18914/10/2024
3e3d3b9c9ec3ff17dd13b8f1827fe263.bin.exe 1150429  3e3d3b9c9ec3ff17dd13b8f1827fe26315/10/2024
e7c94d30f98e713cdd07732c336856751043b4fb.bin.exe 1627574  db3cc0405fd120c7d873af65fde09d3822/10/2024
96d14c903522990020bd116dfa49c11d.bin.exe 1279094  96d14c903522990020bd116dfa49c11d17/10/2024
922f2417846fd9628789289e301ecefd.bin.exe 1213560  922f2417846fd9628789289e301ecefd15/10/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware