Home / Spyware Encyclopedia / Trojan.Agent.suri << Back

Recommendation to Automatically remove Trojan.Agent.suri


Our products can remove Trojan.Agent.suri and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.suri Details


  • Category Trojan
  • Discovered 10/24/2024 12:21:00 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0b0e1bb6b1b988b50e2c0399a9c271b1.exe 92160barbatif lectrifierons4.02.00060b0e1bb6b1b988b50e2c0399a9c271b1 
9bf48ce5ed24e32aa3784d1b1c7f2ee6.exe 307200barbatif lectrifierons4.02.00069bf48ce5ed24e32aa3784d1b1c7f2ee6 
1007-488216f2c6b7dc275b3942c3bde84d27c5a5e519.exe 334336  1a713ac28e8cce28fd47368aa077e84217/02/2022
1007-d3fde936dc959a0344cc803ccac984708e362ad8.exe 334336  4c0bbbe60b5a5f6dd261dc976d28e13d17/02/2022
1069-237c5a980da9667791f2a03aa2a5be6ab3ed9201.exe 334337  3433bad1e9a1be7bdc913849b80d9bb017/02/2022
dfaf0b403b4b492ec7c571d75e704f64b35c54078d6fc2cd5fc0d845423ea2ca.mrg.exe 307202  fe9ea358485808f7307efd0bfa0ec4f817/02/2022
5e3881c6d14e404c31a2391a779906e94d95bac60c9937c78860146a35959f2b.mrg.exe 307202  5510571b4a696cc0065b65c5e7a19ff217/02/2022
836f4a2663f05682a5c5e1bbac905405dd96fd0a159f05be7c2f463830b7c66d.mrg.exe 307203  e02cb6f528c479307f397818d2286a4b17/02/2022
de18cd13f88754565db93019ed82e51a408200a046142d2efcce6d850b840b2d.mrg.exe 307202  84ad4291e4bde9c8c321e2306c78e0fd11/03/2022
ed77184c9929bc9b80789e813c84cead.exe 339968  ed77184c9929bc9b80789e813c84cead19/05/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware