Home / Spyware Encyclopedia / Trojan.MSIL.Agent.foxa << Back

Recommendation to Automatically remove Trojan.MSIL.Agent.foxa


Our products can remove Trojan.MSIL.Agent.foxa and thousands of other Virus and Spyware automatically and instantly.

Trojan.MSIL.Agent.foxa Details


  • Category Trojan
  • Discovered 9/7/2017 4:18:11 PM
  • Modified 8/19/2024 11:24:42 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
38eae4a45f7bc9217653924b4ae645fd.exe 352256 0.0.0.038eae4a45f7bc9217653924b4ae645fd 
c2c26561931d5a9770bbd5b1d171f4d1207ff52400344d8d7dfba522004fbdce.exe 521216Microsoft123.55.2.132013749b250666e7a80358c39e1fbc6f 
d3d2019828e450d9c1167cf179406397f571028960f30d5e39516cd094148159.exe 521216Microsoft123.55.2.13b61e0eb0284de33d2b9bfeb2fea1980d 
9d53ce709c21d34b24973d144961fa66c5a42348f09e77017c87e22dc87d9b28.exe 521728Microsoft1.2.355.222c166e836dbdce4e1f85252a623235e 
f175fa35b31ab5775f2f2d91e73e44ef.exe 352256 0.0.0.0f175fa35b31ab5775f2f2d91e73e44ef 
5a5c53025a2cbcded087976d7c0297bd.exe 346624 0.0.0.05a5c53025a2cbcded087976d7c0297bd 
aa6cef682869f4a800883144f885a39d.exe 347136 0.0.0.0aa6cef682869f4a800883144f885a39d 
b9f62385ed8fda95651cdc20f1c89ef1bd302b7b168bb2c0109278e1809b73e7.exe 346624 0.0.0.09dd6594d951c70b69347eaa6ebc86693 
4cc696ed7cdb3b2de2d0a5a8c556726b.exe 534016Microsoft Corporation2.1.04cc696ed7cdb3b2de2d0a5a8c556726b 
e24e8af55d6a83854f133ba8e770bc333b4ca4a3a44859e4031eeffc5d072f44.exe 346624 0.0.0.0dedd40050a3a4078ae7ee5ba8cb67096 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware