Home / Spyware Encyclopedia / Trojan.MSIL.Agent.foxa << Back

Recommendation to Automatically remove Trojan.MSIL.Agent.foxa


Our products can remove Trojan.MSIL.Agent.foxa and thousands of other Virus and Spyware automatically and instantly.

Trojan.MSIL.Agent.foxa Details


  • Category Trojan
  • Discovered 9/7/2017 4:18:11 PM
  • Modified 8/19/2024 11:24:42 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f0115b9e3e99fd4611bd3bec30b1d65512fe631399e962fa778d95af57469f09.exe 522752Microsoft123.55.2.13942f1dc758e113ad21710ecd85f8a93f 
9d53ce709c21d34b24973d144961fa66c5a42348f09e77017c87e22dc87d9b28.exe 521728Microsoft1.2.355.222c166e836dbdce4e1f85252a623235e 
972f9cb5412fdac38594ca2b88ec131726fef67ce660b3398af7fba49649ee20.exe 352256 0.0.0.04d4b38e4576f2ed00860f3018e0c466f 
122f47fbe46d05c59fc6b16763df5642.exe 352768 0.0.0.0122f47fbe46d05c59fc6b16763df5642 
c3409174aa3ad17301395999e7af8fcb.exe 348160Microsoft1.50c3409174aa3ad17301395999e7af8fcb 
8dde65dc9ce74c467836c4146ed5035965eb3c58b7a611e387e0160acea76b01.exe 346624 0.0.0.04675e921f1cdd2ca3f0526d595e6c451 
eca71483f4f4c94e991157248509e11954cc2fb7e683361973b9b487dfc94323.exe 347136 0.0.0.0922fd2e16dba2c626b1947de99f9f5da 
bc56d8cfb646a5c2b31962cc31c827c820c1dc8c60fb53ebd9c7cb51249ffa68.exe 347136 0.0.0.00894095d934b44a289681f88dca20cfa 
22e8a9520a1e13a8c5e4f3c744aeb6d7.exe 346624Company1.0.0.022e8a9520a1e13a8c5e4f3c744aeb6d7 
20200127233456181597.exe 311808Microsoft1.0.0.0e04c9fca49004e4d19747aa679bd567101/02/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware