Home / Spyware Encyclopedia / Trojan.Agent.adath << Back

Recommendation to Automatically remove Trojan.Agent.adath


Our products can remove Trojan.Agent.adath and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.adath Details


  • Category Trojan
  • Discovered 6/6/2023 3:07:28 AM
  • Modified 6/7/2023 10:33:20 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c6e510a24c0984fbe72eb42cb253f3f4.exe 117048  c6e510a24c0984fbe72eb42cb253f3f421/05/2022
1b90d3b7ca6eef18c838ab1f3c04cd96f87c6afd.bin.exe 117937  990bc898aeb4cc68bc47bf9a0fae9f0113/12/2022
90c49632adacaf900a80b03c6063a4f510af4ce8620f870189540e914f39a933.mrg.exe 117157  0049ccb3926300957a10618c99ba6dca26/05/2022
087d4a382b3e92d6fa900b3ec6dba0d14ec34967b97693ffa4fd5059ac64bc72.mrg.exe 117090  67e56838b7e8978e1c12e40584ed9e9526/05/2022
fdedfe041b21373263bb0b3f47959be50b0b86f40ee26160b65e9087e0588b1e.mrg.exe 117017  12c32b632532a93ea84f24f2600dfe2225/05/2022
a814757315d5b5438902924a048b8594eb21d9369acec3b736a5ea7283aa3fe8.mrg.exe 117123  11d6c10ccca6852c1470298a52a6a90a24/05/2022
d8f573046c21efa78ebb53e868e529666e9a3d212f65bac2beb570c34569a6ed.mrg.exe 117517  83f48eef8aa107e403c175ea4128725417/02/2022
1007-ba87b126723329b48d93d987adb098cf378c5244.exe 117493  a4358a2baa5b46a4faf144a2f329064816/02/2022
1007-aacea8ed58c1576c268836da838aafbc9c46e37b.exe 117558  32e7a237132f31c64bb02b444e9668a616/02/2022
1007-97138b465f975617dd8d54b9f2f5913f60b5d25a.exe 117492  17700883e0d6c30338cff11832d04dd816/02/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware