Home / Spyware Encyclopedia / Exploit.Agent.cv << Back

Recommendation to Automatically remove Exploit.Agent.cv


Our products can remove Exploit.Agent.cv and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.cv Details


  • Category Exploit
  • Discovered 10/19/2012 5:36:20 AM
  • Modified 6/12/2020 3:31:19 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1d802da3.exe 106542  1e830dac8f189baba9566e9cf3c664a9 
64e32c3f.exe 6656  48e3b13081f727abd3c72bed2e254c8b 
exploit.win32.img-wmf.ga 106542  1e830dac8f189baba9566e9cf3c664a9 
1ac95c4b01649b6b9f3f488e9e1124a783a9d92dfa1eae3185b7fa3d507715bc.exe 106557  4bfca9fca140a4b642228fadbc9e5e64 
193630087543720229987f9c41b9db20ea55b2df0d76049e82559b02f29cfd756e3af67f16a46b41c67afc5ea4ddb.exe 106590  7dbfe29579a2b8369cb0407ccd8755ee 
nod32.class 7901  b7d83626ca5badf386177deab6f00f50 
ec5e3ec9ce6c266f1fd9a653ed371f4d.exe 106570  ec5e3ec9ce6c266f1fd9a653ed371f4d 
b77318d5e0dfb60302068d9f80f6cf654aac8b4cb9ba314ffb50b514360adca9.exe 106592  9e2801afe3ba98ee1d334b1d46dad892 
1931490446598b0cf885eadde6258512fa5d12edd05ebc98756fdf960344d5dc6a2fdd9d1484bc87a562085efdcf5.exe 6656  219c77680bb6f260dc51d520b6913335 
3a3f87d15d347207364797c1fff1bbdd.vir.exe 106590  3a3f87d15d347207364797c1fff1bbdd 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware