Trojan

Trojan-Dropper.Java.Agent information

Malware Removal

The Trojan-Dropper.Java.Agent is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Dropper.Java.Agent virus can do?

    Related domains:

    z.whorecord.xyz

    How to determine Trojan-Dropper.Java.Agent?

    
    

    File Info:

    crc32: 0D83886D
    md5: 5879f6b47ee9f8f02f53a1f51abec06d
    name: upload_file
    sha1: b54b62e1af1568983912f944ef01685cf2edb187
    sha256: fa4a2bfbc569a10517a6f52078cb574bf4038178010b444511c3a57c3ad9132a
    sha512: 1e3d52948ec09cb8ca8fff4d9aa5db23ca0a22a7686f3cbda2a57537ec356ba948f33529fd6a513f450da4a508801d8fc43815fa6e8a60f48542da04f47c4bb6
    ssdeep: 6144:Ha3koyVZ7006kMxRSSFjvNWOXdGlCT2MLotDaCm:60HVZ7006dWEK622a6
    type: Java Jar file data (zip)

    Version Info:

    0: [No Data]

    Trojan-Dropper.Java.Agent also known as:

    AegisLabTrojan.Multi.Generic.4!c
    CynetMalicious (score: 85)
    KasperskyHEUR:Trojan-Dropper.Java.Agent.gen
    F-SecureMalware.JAVA/Agent.aga
    McAfee-GW-EditionArtemis!Trojan
    IkarusTrojan.Java.Agent
    AviraJAVA/Agent.aga
    MicrosoftTrojan:Script/Wacatac.C!ml
    ZoneAlarmHEUR:Trojan-Dropper.Java.Agent.gen
    Qihoo-360Generic/Trojan.Dropper.ccd

    How to remove Trojan-Dropper.Java.Agent?

    Trojan-Dropper.Java.Agent removal tool
    • Download and install GridinSoft Anti-Malware.
    • Open GridinSoft Anti-Malware and perform a “Standard scan“.
    • Move to quarantine” all items.
    • Open “Tools” tab – Press “Reset Browser Settings“.
    • Select proper browser and options – Click “Reset”.
    • Restart your computer.

    About the author

    Paul Valéry

    I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

    Leave a Comment