Home / Spyware Encyclopedia / Backdoor.Agent.cdko << Back

Recommendation to Automatically remove Backdoor.Agent.cdko


Our products can remove Backdoor.Agent.cdko and thousands of other Virus and Spyware automatically and instantly.

Backdoor.Agent.cdko Details


  • Category Backdoor
  • Discovered 8/2/2023 9:19:06 AM
  • Modified 8/2/2023 6:05:01 PM
  • Threat Level Low
  • Category Description
    A Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user's knowledge. A Backdoor compromises system integrity by making changes to the system that allow it to be used by the attacker for malicious purposes unknown to the user.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2821a52563ffdbd3dd45677963817183.jpg.exe 58880Stupp3.9.5.42821a52563ffdbd3dd45677963817183 
d746dc8dc5c56a7c3904b9869d7aad21.tx_.exe 58880Stupp3.9.5.4d746dc8dc5c56a7c3904b9869d7aad21 
63944393858c63182a3a3ef5a9162df6.exe 58880Stupp3.9.5.463944393858c63182a3a3ef5a9162df6 
6fcd25f4b3b27d99ca12b62556c09389873c9d01c380d49bc4563d6b4e6e3196722e9dfbc33898c380708483e91afa1f623.exe 51829  ff928de853e662fde13bd9c7828c463b 
b031c932baf8a2bb486674690bbb49dbd486619952fe624415ed2c25a93d42b9.exe 58880Stupp3.9.5.4b6a40eb317fc5d48e5398a67e2ce03c4 
backdoor.win32.agent.cdko-f7ad4b5fa0db541d8528fa83ace26b28aa0ad10fc026a2cb4eeb1b7454be908f.exe 58880  bf5da50c0ca560be53ad83b8b327b00e02/08/2023
51266a6ef942511b8059029de53d4c424e56562563de63b43b436f02322e151b.exe 58880Stupp3.9.5.471fed0c576f5f35a6c23a94e5064cda518/07/2023
43e878f3af19e77d496362f992c62082.exe 58880Stupp3.9.5.443e878f3af19e77d496362f992c62082 
162484953619a3b858a90fdb034e9a69.exe 96040Stupp3.9.5.4162484953619a3b858a90fdb034e9a69 
417e6b6c7a1b085f5595c82c12e84efca9e0167567b03b8a1512ce0103451c07.exe 58880Stupp3.9.5.4d0048bca9790a9da254d146a87dbd0fa 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware