Home / Spyware Encyclopedia / Trojan.Agent.icgh << Back

Recommendation to Automatically remove Trojan.Agent.icgh


Our products can remove Trojan.Agent.icgh and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.icgh Details


  • Category Trojan
  • Discovered 5/25/2018 10:06:01 AM
  • Modified 5/25/2018 5:26:11 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-7\2416e37bbbe7d0525f436177d38dbf75 740253  2416e37bbbe7d0525f436177d38dbf75
..\Extracted\19-2,5\663967f3314b6d27cdafefc4604acaba 671774  663967f3314b6d27cdafefc4604acaba
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\f96dae16f4622e19fa7f5bc755c7760f 671796  f96dae16f4622e19fa7f5bc755c7760f
..\Extracted\19-2,5\663967f3314b6d27cdafefc4604acaba 671774  663967f3314b6d27cdafefc4604acaba
..\Extracted\19-2,5\663967f3314b6d27cdafefc4604acaba 671774  663967f3314b6d27cdafefc4604acaba
..\Extracted\19-2,5\33231e8cd2d81a5ff6b077ab6e05445c 671780  33231e8cd2d81a5ff6b077ab6e05445c
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\a1a58218727f1f7d692c09a8acf26e70 589916  a1a58218727f1f7d692c09a8acf26e70
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-7\985494874ae921381a4f82d854cb4e8e 740241  985494874ae921381a4f82d854cb4e8e
..\Extracted\19-2,5\1c3ab6a11efebb208b7a10a89e369a03 740203  1c3ab6a11efebb208b7a10a89e369a03
..\Extracted\19_6-7-8\recovered_sample_2014-06-19-8\d53888104425d67146202002f724c4b1 671770  d53888104425d67146202002f724c4b1

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware