Home / Spyware Encyclopedia / Trojan.Agent.a << Back

Recommendation to Automatically remove Trojan.Agent.a


Our products can remove Trojan.Agent.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.a Details


  • Category Trojan
  • Discovered 6/28/2011 3:06:08 AM
  • Modified 2/14/2019 1:28:11 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\2008\2008Dec\10\20081210\not-a-virus.RiskTool.Win32.Agent.a\0915AE3D.EXE 788992China Cracking Group1, 0, 1, 75f15b93d3c09b60869e4d4d79d4d79e1
..\2008\2008Jan\20080125\Trojan-Dropper.NSIS.Agent.a\3BCBF8E9.EXE 245336  fde022d51cb908aaa40c6bbc0234ddcd
..\2006\2006Aug\20060808\20060808\not-a-virus.Server-FTP.Win32.Agent.a\E5AB0550.EXE 15360  f5b91f85666ef7f2870b92ac1dc6c42c
..\2007\2007Nov\20071116\20071116\not-a-virus.Porn-Dialer.Win32.Agent.a\269C66A4.EXE 85330  efb583cac5dd7181cf439ac805adaa1e
..\2008\2008Sep\20080919\IM-Worm.Win32.Agent.a\7E4DB1CE.EXE 192000  e0f1d70a51495ae368d3663af0032ebc
..\2008\2008Mar\20080304\IM-Worm.Win32.Agent.a\AF5A0922.EXE 189440  d7c79193ab68eb0758466b983b59fb63
..\2007\2007Sep\20070927\20070927\IM-Worm.Win32.Agent.a\9CC6955D.EXE 280064  d06ebce5865da7c7f2360cb6e709e206
..\2007\2007Jan\20070105\20070105\not-a-virus.Dialer.Win32.Agent.a\F8B86D76.EXE 50688  c73653952a2f8d41a960f140f7444db7
..\2009\Aug&Sep\Aug\20\20090820\20090820\Trojan-PSW.MSIL.Agent.a\88A48A6E.EXE 196608  be98f1a0eb1a65bddec63cc8f11c8ff9
..\2007\2007Aug\20070802\20070802\not-a-virus.Porn-Dialer.Win32.Agent.a\16A7DF83.EXE 61440  7864eee3073c1b0ddfde173e831bce22

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware