Home / Spyware Encyclopedia / Trojan.Agent.suri << Back

Recommendation to Automatically remove Trojan.Agent.suri


Our products can remove Trojan.Agent.suri and thousands of other Virus and Spyware automatically and instantly.

Trojan.Agent.suri Details


  • Category Trojan
  • Discovered 10/24/2024 12:21:00 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
dfaf0b403b4b492ec7c571d75e704f64b35c54078d6fc2cd5fc0d845423ea2ca.mrg.exe 307202  fe9ea358485808f7307efd0bfa0ec4f817/02/2022
f061d0e70e9753b06b7f55d8d9ccc6b992c4292558c3f80f6aa58553349fb5c0.mrg.exe 307202  1a25eb487f133135045f753a93f73c4019/05/2022
f829a245649bf2ce14316dccc7442db1cc4be4ac5dda07cc7f87f283b988b525.mrg.exe 311296  0260681d54371d550ad04df7c7fe25b019/05/2022
d24a7e8c8acc63e9010ac43fca3eab39aec07f301217f4ac3b242433d75a97bc.exe 339968  5ce5dd8937a97b850d19c02984d715c719/05/2022
e4d4af362b143857cf56488ce7cfe65c.exe 311296  e4d4af362b143857cf56488ce7cfe65c19/05/2022
fdb05085386b4a547ca3592749e2368cf327b701df3f503e1c69db07122ed044.mrg.exe 307203  bc42f3fb1fbc2012a12d1cf494f9029c19/05/2022
fe48f331aab18bc2294f0c1d18e009f09d3429ce6a5f15607fdc9e42beda1764.mrg.exe 311296  f364dc3f8cf0cfda884b34f8aab1e04519/05/2022
020d7a6bf380ae9bdde05347d853ef3d7db2ada5492d9b31a7fed7151ea37120.mrg.exe 311297  c7bfc10f2d530267fe7ef7b96b86050821/05/2022
00b5d2758c3db0417142c97aacf31b5c7fa676169613e1fbb425e81763d30c72.mrg.exe 311296  c408f90072f73da12cf6573254b3a10d21/05/2022
10bd909feb77bab9444f73d1335789dc182356a70074c0c127e0c07f85dd57f9.mrg.exe 311296  e3f1ebd416f888b4238010053650ce5321/05/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware