Home / Spyware Encyclopedia / Trojan.bundler.cay << Back

Recommendation to Automatically remove Trojan.bundler.cay


Our products can remove Trojan.bundler.cay and thousands of other Virus and Spyware automatically and instantly.

Trojan.bundler.cay Details


  • Category Trojan
  • Discovered 2/14/2024 3:14:19 PM
  • Modified 2/15/2024 11:48:37 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
10a4faa888f118bf4355b6425d9a5c1649233a6515fb165d7f458b88eaf7ed42.mrg.exe 13980  a8a64550af4ba5bf3e1989832a53429106/02/2024
f0283e87d96829744fadc770356a13b52ca7e0c6.bin.exe 250368  b076ae130d647e0c456d1954612ecb6409/05/2023
ca27825ab1848ec96a208ebab8a65e4ec475eedeb930d1950276931067bd1d14.exe 256808  f2d630811ba2860a579142ad098f531702/03/2023
abfdb191d0335f5cfe1494801a6af18d26012f4e.bin.exe 256800  8a488f92fd18aa0b345c011833079daf11/01/2023
6633b75cf9c7ad608f37f6404fd1e902fd8f65e8.bin.exe 256816  3ff29fa52e7d47608a16043f9b4f614513/12/2022
4bb25edf7c18cda410b0831b13159427cc23771cd9e3b6473e4e5bfebdb75f36.exe 256824  b3a77e96e2b91bf1f2546eb3d557279523/11/2022
3e4534d4585c6760fb662a0f694ace0cdf7c11c285f59deaaa25f9c2c1cbc5cc.exe 256816  d250b071ba77a77cc783559855699d1321/09/2022
77a0463434464ae6bd80a5b152fd65cdc0ddc698accbf0b860e2c02e63a84d54.mrg.exe 256808  f4a36a7ce3b0dbbefbd69e4f4dc64dad26/08/2022
07956b1577e587a00e32919f1a186e9ecd9f7c7588dd20e16369e30f8edc8107.mrg.exe 256800  59ff0d6ffb10a2102d78a280d6f1569816/06/2022
625c31742f4ca9f811483903f68cc089.exe 250368  625c31742f4ca9f811483903f68cc08918/03/2021

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware