Search our virus encyclopedia
Exploit_c AVG detects this somewhat active Trojan horse and its 98 known variants.
The most popular variants of Exploit_c are Exploit_c.VRQ, Exploit_c.VRA, Exploit_c.TTH more ... Exploit_c.VRR, Exploit_c.VTX, Exploit_c.TJX, Exploit_c.VQN, Exploit_c.XFU, Exploit_c.UZN, Exploit_c.VVV, Exploit_c.TGZ, Exploit_c.JZH, Exploit_c.KGS, Exploit_c.THZ, Exploit_c.TKA, Exploit_c.RQJ, Exploit_c.JEW, Exploit_c.DSP, Exploit_c.UST, Exploit_c.VRC, Exploit_c.WAC, Exploit_c.RRU, Exploit_c.VQW, Exploit_c.RQA, Exploit_c.TQK, Exploit_c.VIU, Exploit_c.USL, Exploit_c.WPA, Exploit_c.WLW, Exploit_c.WGU, Exploit_c.HVT, Exploit_c.VRU, Exploit_c.VVU, Exploit_c.CFE, Exploit_c.TMT, Exploit_c.OTP, Exploit_c.MLF, Exploit_c.VHP, Exploit_c.WGV, Exploit_c.WPD, Exploit_c.TCV, Exploit_c.WMH, Exploit_c.WLI, Exploit_c.TJW, Exploit_c.WAB, Exploit_c.WPO, Exploit_c.KHL, Exploit_c.WQJ, Exploit_c.VMB, Exploit_c.KSN, Exploit_c.VZR
What is Exploit_c?
Exploit_c is a malicious application that gives hackers remote access to the infected computer and allows them to perform operations like modification of files, theft of personal information, installation of other malicious software. Exploit_c invades a PC with the help of infected email attachments, links and websites, among others.
Exploit_c is a threat that is spreading. It is currently ranked 28 in the world for online threats. more ...
How can I remove Exploit_c?
If you received a pop-up warning for Exploit_c while you were surfing a website, chances are that the threat was blocked and there's nothing to remove. more ...
Need technical support?
Free technical support is included with any paid AVG Anti-Virus product.
Rank this week
Rank last week
% of global detections
THREAT DETECTIONS INDEX
The results provided by this website are provided on an "as is" basis with no warranty as to accuracy or completeness. You acknowledge by using this website that you have read and agree to the terms and conditions available here.