Home / Spyware Encyclopedia / Exploit.Agent.cm << Back

Recommendation to Automatically remove Exploit.Agent.cm


Our products can remove Exploit.Agent.cm and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.cm Details


  • Category Exploit
  • Discovered 1/14/2011 1:14:38 PM
  • Modified 2/22/2019 11:44:20 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
exploit.win32.agent.cm 45056  560cc26d276a849ea04192f934f03a95 
22baf22e3f873f2376a83b79e2b56e19209a9299.bin 147512  7fc0461d4440c5cd0e5878fe499c9665 
912a0536fe4f44c05c044b65a296c4cd 259896  912a0536fe4f44c05c044b65a296c4cd 
ca74a69ce757d3dc89a360878d846b46.vir 275772  ca74a69ce757d3dc89a360878d846b46 
ebbbc2f3544b57d03cda0acd573564e1fdd5e171821bfcd06075d43d7b71c088 252216  113795739952da7a9bd17c4d6bb7d603 
772ee6c017f3d71d8ced981b9f1ffdc21733505877660392f9bf96b296b0e1a1 155704  efb77b1fb74bcd0354192e634fc28300 
69f648cfe7694694676eb9d9e2894d7c28dcfa0f6f325c1fc8c6f9d2ee527586 218680  81d9887dadf30b892b0c4e1489572c0a 
6609c0d8474df4db9a28794438e1ceb4.doc 159800  6609c0d8474df4db9a28794438e1ceb4 
e90691f93e17f4a0a96269b2ae54cddbd1a13e9dc057639f596860e8180ad71a 316472  ed677a6507cbd09a5e628460c7d10c49 
9022bc452168aff80775c8adb52f2787.doc 152035  9022bc452168aff80775c8adb52f2787 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware