Home / Spyware Encyclopedia / Trojan.Scar.iiyo << Back

Recommendation to Automatically remove Trojan.Scar.iiyo


Our products can remove Trojan.Scar.iiyo and thousands of other Virus and Spyware automatically and instantly.

Trojan.Scar.iiyo Details


  • Category Trojan
  • Discovered 10/25/2024 5:19:06 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
00a9dcc4babd85eb510dc33b285ffd08.vir.exe 60440  00a9dcc4babd85eb510dc33b285ffd08 
8f35a946ddd5d5c7d94e4b2250d08492.vir.exe 60440  8f35a946ddd5d5c7d94e4b2250d08492 
849c7a070e7dc763547620a7e3bb38d5.vir.exe 60452  849c7a070e7dc763547620a7e3bb38d5 
789ac7310c7a35a0b46e4b543f95fe99b5b894304d131964665671f1de5ee4ac.mrg.exe 358532  e46c137f50b27e35a52e12e7c4b7cce408/07/2022
f6325651bd6db1962b7dc3c189d267b793ca590ee538d51e4197b925d49d39d3.mrg.exe 61572  8fb70cfa7fcf7e789f4680b5b24308eb08/07/2022
0d8d0da2321c9623b57e3ded6105fa00.vir.exe 358544  0d8d0da2321c9623b57e3ded6105fa0014/07/2022
80ac697daaa8cc6696cf597064af4560.vir.exe 358556  80ac697daaa8cc6696cf597064af456014/07/2022
17a7910fb77af639f302d14fb7a0e08a9e15ff99079b4d6d5959f422c15fca99.mrg.exe 61584  29b451f25032fe5aedadcab03aab8fe815/07/2022
58fe54d225d311ead12f3f70d6d7d6745f0d61b1c17897962d21cca9fd9a9ac2.mrg.exe 358664  565eae9c20866e8228c0d2d1f7d0af3426/07/2022
d0fed79c479942872df992acf00cb698ea2a0abcbb0c09b9418118a7c4dc9e8d.mrg.exe 358688  7e0ad5ad90ac6621a43eec293cee206027/07/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware