Home / Spyware Encyclopedia / Trojan.Scar.iiyo << Back

Recommendation to Automatically remove Trojan.Scar.iiyo


Our products can remove Trojan.Scar.iiyo and thousands of other Virus and Spyware automatically and instantly.

Trojan.Scar.iiyo Details


  • Category Trojan
  • Discovered 10/25/2024 5:19:06 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
00bb8d45285b2ed1a89124db9edab16a.vir.exe 60428  00bb8d45285b2ed1a89124db9edab16a 
e740acdead4ab895b30c6e3325a505d0.vir.exe 60452  e740acdead4ab895b30c6e3325a505d0 
608c38991a458d0c3f377d93be49951b.vir.exe 60440  608c38991a458d0c3f377d93be49951b 
8f35a946ddd5d5c7d94e4b2250d08492.vir.exe 60440  8f35a946ddd5d5c7d94e4b2250d08492 
215a0d3f43be3d753b32feb29dfa8c9e49e8365fa2400f95c6ccaaa030693f03.mrg.exe 358532  1c9db47a03bd2dabca67e4d41a5b7f8808/07/2022
789ac7310c7a35a0b46e4b543f95fe99b5b894304d131964665671f1de5ee4ac.mrg.exe 358532  e46c137f50b27e35a52e12e7c4b7cce408/07/2022
fad909ca18b07e9c4b8ca718e2b7267f.exe 358676  fad909ca18b07e9c4b8ca718e2b7267f02/08/2022
35ebbbe96fb21398143c1902163cfb54a3f3755594722afafbabda4325696200.mrg.exe 358712  5d81ee6182e61ddf1f8ff0e193f4c60212/08/2022
b90b0522e5ce2745062f69bc0e63ca0e8ecab5f20c6fe5c0c18a39493402f6c9.mrg.exe 358700  d2a13329231560f0d4560f977cd322b612/08/2022
666b8683ed0ace8ff16564def592adf0e7e7ae1c4eb28a47883ed814b3a71841.mrg.exe 358736  bc0264c9da6cfb976e2a3d81a0c70aad12/08/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware