Home / Spyware Encyclopedia / Trojan.Agent2.mml << Back

Recommendation to Automatically remove Trojan.Agent2.mml


Our products can remove Trojan.Agent2.mml and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent2.mml Details


  • Category Trojan
  • Discovered 4/24/2024 10:17:56 PM
  • Modified 4/25/2024 11:34:55 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
abb7ae00dbb40c5df56c5b5a42a251c3.vir.exe 421888Microsoft Corporation11.0.5604abb7ae00dbb40c5df56c5b5a42a251c3 
c72fa7731dce6aec01c5f4bd1eb34144.vir.exe 421888Microsoft Corporation11.0.5604c72fa7731dce6aec01c5f4bd1eb34144 
c6b6babf51dc41d0f61acb41bc7ce5b0.vir.exe 421888Microsoft Corporation11.0.5604c6b6babf51dc41d0f61acb41bc7ce5b0 
ad8a6cdc54f15246148be50276a83064.vir.exe 421888Microsoft Corporation11.0.5604ad8a6cdc54f15246148be50276a83064 
acdd8814a8abe8a7990a0f1e4e59e041.vir.exe 421888Microsoft Corporation11.0.5604acdd8814a8abe8a7990a0f1e4e59e041 
ad24eb20f2f087cad9f7881b17c68910.vir.exe 421888Microsoft Corporation11.0.5604ad24eb20f2f087cad9f7881b17c68910 
adadbcd0263c947282c17d4c4229f9e5.vir.exe 421888Microsoft Corporation11.0.5604adadbcd0263c947282c17d4c4229f9e5 
ac207c23dc53ec48a6a5eb09e213efd0.vir.exe 421888Microsoft Corporation11.0.5604ac207c23dc53ec48a6a5eb09e213efd0 
acfe3103071232a70712ad6d816542c3.vir.exe 421888Microsoft Corporation11.0.5604acfe3103071232a70712ad6d816542c3 
ae06b64256ccbbb59bd65cf6f1a27360.vir.exe 421888Microsoft Corporation11.0.5604ae06b64256ccbbb59bd65cf6f1a27360 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware