Home / Spyware Encyclopedia / Exploit.Agent.fz << Back

Recommendation to Automatically remove Exploit.Agent.fz


Our products can remove Exploit.Agent.fz and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.fz Details


  • Category Exploit
  • Discovered 5/29/2011 3:46:21 PM
  • Modified 2/22/2019 11:44:20 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
626c6f7649dc13164c3cefb2b7cf69a2 3069  626c6f7649dc13164c3cefb2b7cf69a2 
e38fba226592522205330723c40f536f 3069  e38fba226592522205330723c40f536f 
1a3337da60e88fde739e3f09243cad97.vir 2733  1a3337da60e88fde739e3f09243cad97 
6f43d7cc1d4093854f53412559a76ab7325cbfd1cfd22855ffa67d5475fdceb0 3069  f9c08543bd48a5427d3443a89dea4a78 
0b65d71e796241d625a334b15be59301da1b865556dca4cf87d9d191d161e2bd 3069  9a8a14b875bda3c5a46e4ed7757488c6 
31cde58ab47abdfcecdfe2626c11254a 3216  31cde58ab47abdfcecdfe2626c11254a 
aa4a3e44b0f2c0a5323b33f6a28be35a 3069  aa4a3e44b0f2c0a5323b33f6a28be35a 
1507547_field.swf 1564  d54869a6568e25f18cf35a080a96630d 
bcc7939e1f22a64d9130702bf9da37df.cla 8158  bcc7939e1f22a64d9130702bf9da37df 
4d5c7c3d1a6e773fc6755262082c9663.vir 2210  4d5c7c3d1a6e773fc6755262082c9663 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware