Home / Spyware Encyclopedia / Exploit.Agent.gc << Back

Recommendation to Automatically remove Exploit.Agent.gc


Our products can remove Exploit.Agent.gc and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.gc Details


  • Category Exploit
  • Discovered 4/19/2024 2:50:22 PM
  • Modified 4/19/2024 3:28:40 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1548721e60724930728f6bd1db45c0ee.vir.exe 188416PBS1.0.0.01548721e60724930728f6bd1db45c0ee 
f75492cb884672440773a6f478d93a5c2ebf6853baa3c1897120f0dc043515fd_sample.bin.exe 328704  2346c7e68a23f2721824ef0ce05e9f0719/04/2024
f5a3e9ccb057fa857259adc2b3676387.exe 39936  f5a3e9ccb057fa857259adc2b367638708/12/2022
0fe27403fd150af770561263fcdc1426.exe 39936  0fe27403fd150af770561263fcdc142618/03/2021
c44a9da2bfb1edd1c731968a7d687d5a.exe 39936  c44a9da2bfb1edd1c731968a7d687d5a14/08/2020
be6e78a95a4df4788960fae191306469.dll 40448 2, 0, 0, 2be6e78a95a4df4788960fae191306469 
1f26b44fc31af39e4ee9f1cfaaaf4d23.vir.dll 40448 2, 0, 0, 21f26b44fc31af39e4ee9f1cfaaaf4d23 
a2e08876c8b0b71f82fe13257845afc0.vir.dll 40448 2, 0, 0, 2a2e08876c8b0b71f82fe13257845afc0 
ad57210989fe603ff088b1002a0d1634.vir.dll 39936 2, 0, 0, 2ad57210989fe603ff088b1002a0d1634 
4c1342ae3cfb2d46d7b140ef4ec1a504.vir.dll 40448 2, 0, 0, 24c1342ae3cfb2d46d7b140ef4ec1a504 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware