Home / Spyware Encyclopedia / Backdoor.Agent.ulo << Back

Recommendation to Automatically remove Backdoor.Agent.ulo


Our products can remove Backdoor.Agent.ulo and thousands of other Virus and Spyware automatically and instantly.

Backdoor.Agent.ulo Details


  • Category Backdoor
  • Discovered 3/28/2011 6:54:35 PM
  • Modified 8/5/2023 2:44:07 PM
  • Threat Level Low
  • Category Description
    A Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user's knowledge. A Backdoor compromises system integrity by making changes to the system that allow it to be used by the attacker for malicious purposes unknown to the user.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ecaa38328ca827ed0cfbee0d025e00d8.exe 53307Apple Inc.4.531.9.0ecaa38328ca827ed0cfbee0d025e00d8 
9628dfcc5ed68d915466934f58f82bed.exe 52924 1.0.0.19628dfcc5ed68d915466934f58f82bed 
backdoor.win32.agent.ulo.exe 30790Microsoft Corporation5.1.2600.218039ca6a3b2b8d6b7d140df53486c689b6 
52d5584473c0f0e6f0d1f8ae06a54af9.exe 51200Microsoft Corporation5.1.2600.218052d5584473c0f0e6f0d1f8ae06a54af9 
fc10405ae156186eb3fa4a876e7016c1.exe 58952 1.0.0.1fc10405ae156186eb3fa4a876e7016c1 
b658d8b5ef30a1a2083db3a3325df15c.dll.exe 53630tencent0, 3, 2, 4b658d8b5ef30a1a2083db3a3325df15c 
de45641d28e5937825f1b24ae7c27992.exe 54478tencent0, 3, 2, 4de45641d28e5937825f1b24ae7c27992 
cdd6e0c5b5b8fd1c6bf819a8ce83290e3cd70a93ced7aeb06999e1b4214a92c7a1f4635cc668821155875d6344ed37a4250.exe 146502tencent0, 3, 2, 457b2069e91fb13fbf90597021aa6a240 
696b7f085d9c9b4eb0eb63826b501d1b8f0e1756ac7fd18263a97fae4499ba3dc16d896f278dca6473843d8d07acd152f16.exe 57346tencent0, 3, 2, 4646846c4c4e1852f2bf2f68f7cb428db 
3966c67e3b251e3abd26f1a1a49995b5.vir.exe 31140Microsoft Corporation5.1.2600.2180 (xpsp3966c67e3b251e3abd26f1a1a49995b5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware