Home / Spyware Encyclopedia / Trojan.Agent.icgh << Back

Recommendation to Automatically remove Trojan.Agent.icgh


Our products can remove Trojan.Agent.icgh and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.icgh Details


  • Category Trojan
  • Discovered 10/17/2018 1:11:03 PM
  • Modified 10/20/2018 12:39:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\Extracted\19-2,5\1c3ab6a11efebb208b7a10a89e369a03 740203  1c3ab6a11efebb208b7a10a89e369a03
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\ea13337affb36f0f8c87e00700f02f83 671790  ea13337affb36f0f8c87e00700f02f83
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\8a65725f1cb12ea71a0b2a431d7cbec5 253952  8a65725f1cb12ea71a0b2a431d7cbec5
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\c192305ec6537b4108e89b10311b8a22 740209  c192305ec6537b4108e89b10311b8a22
..\Extracted\19-2,5\33231e8cd2d81a5ff6b077ab6e05445c 671780  33231e8cd2d81a5ff6b077ab6e05445c
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\7612470feb640c747ceae6fcbfaff30f 740257  7612470feb640c747ceae6fcbfaff30f
..\Extracted\19-2,5\c1640ff827dad2fcf3321b008f5e7b7d 671784  c1640ff827dad2fcf3321b008f5e7b7d
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\f96dae16f4622e19fa7f5bc755c7760f 671796  f96dae16f4622e19fa7f5bc755c7760f
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\898bf59a390fb73fa7e5a119addfb634 740265  898bf59a390fb73fa7e5a119addfb634
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-7\43c60ef98fb32f92400c09e9c551eec8 671796  43c60ef98fb32f92400c09e9c551eec8

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware