Home / Spyware Encyclopedia / Backdoor.Agent.cvs << Back

Recommendation to Automatically remove Backdoor.Agent.cvs


Our products can remove Backdoor.Agent.cvs and thousands of other Virus and Spyware automatically and instantly.

Backdoor.Agent.cvs Details


  • Category Backdoor
  • Discovered 8/8/2013 8:42:27 AM
  • Modified 1/31/2024 10:29:57 AM
  • Threat Level High
  • Category Description
    A Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user's knowledge. A Backdoor compromises system integrity by making changes to the system that allow it to be used by the attacker for malicious purposes unknown to the user.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
185918046868a0345be99f43f3b95ab2cabdabceb415d37443c9051d7458db07050e3d33ac7619b1cc54d06176f0c.exe 1341199Trend Micro Inc2.00.0026cb3660a1faa3b69bf6e6b281e54ce80 
42755ded0cb14c0897f3ed22f0260d22.vir.exe 724994  42755ded0cb14c0897f3ed22f0260d22 
4a6effe31628e0415f94f6c372b73e91.vir.exe 940564Trend Micro Inc2.00.0024a6effe31628e0415f94f6c372b73e91 
3689e62ef6cb3a5f39c9963010dc5b80.exe 586705Trend Micro Inc2.00.0023689e62ef6cb3a5f39c9963010dc5b80 
977e45da19b3fc5c2e93cde8ba9ed88b.exe 448802Trend Micro Inc2.00.002977e45da19b3fc5c2e93cde8ba9ed88b 
cfc50cf95c32e31cc64e036333c0480d.exe 3298432Trend Micro Inc2.00.002cfc50cf95c32e31cc64e036333c0480d 
8ad0dc07ee8fa6de27643b7f8a8fa768.vir.exe 840574Trend Micro Inc2.00.0028ad0dc07ee8fa6de27643b7f8a8fa768 
69b49534745ef129efaf1db56126b50a.exe 739779Trend Micro Inc2.00.00269b49534745ef129efaf1db56126b50a 
182d4418db993c5281ca8c48a5a00fb4b2534a94.bin.exe 5442619Trend Micro Inc2.00.0022df7ce9b4103e8f25f40a064a3883fd3 
51866e8581fe54b50c24a138d6c66d2bb1f8f3178f039c7d4dc2ff808e545387.exe 315742Trend Micro Inc2.00.002e81800680f4d86cefcac7a0979e6fb63 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware