Home / Spyware Encyclopedia / Exploit.Agent.aze << Back

Recommendation to Automatically remove Exploit.Agent.aze


Our products can remove Exploit.Agent.aze and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.aze Details


  • Category Exploit
  • Discovered 4/14/2010 2:47:44 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5d948a0c04890ee943830c9cd03bce58 19879  5d948a0c04890ee943830c9cd03bce58 
798f919f724675c662c89dfe8b15b6c3 3002  798f919f724675c662c89dfe8b15b6c3 
237963852a37698f2f115484b5ec1043 13234  237963852a37698f2f115484b5ec1043 
126d69c7b5e4957f2041cdc7e1c16a0d 24689  126d69c7b5e4957f2041cdc7e1c16a0d 
a558f74d5662807e9ff94bb4720e93a1 28431  a558f74d5662807e9ff94bb4720e93a1 
409861d640aeabf14f2bc870c776be23 36096  409861d640aeabf14f2bc870c776be23 
fdc51a92134da384bd5806a1a7ed4e2e 18257  fdc51a92134da384bd5806a1a7ed4e2e 
8b8691d897cf6110987ce038e0aa3dde 35990  8b8691d897cf6110987ce038e0aa3dde 
4f844632b275ab29970a39c0461aea422d9855c7fd0372b8a1f5cf8b83fe6697.htm 28501  02592ff70e358377edf05da242a09a5f 
d4505cf1fa834d175ea43f96e56fb071.vir 1170  d4505cf1fa834d175ea43f96e56fb071 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware