Home / Spyware Encyclopedia / Exploit.Agent.c << Back

Recommendation to Automatically remove Exploit.Agent.c


Our products can remove Exploit.Agent.c and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.c Details


  • Category Exploit
  • Discovered 1/5/2012 4:42:01 PM
  • Modified 4/26/2021 6:05:36 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d39784cd0d4d853682766bb249fbddec.vxe.exe 255454 1, 0, 0, 1d39784cd0d4d853682766bb249fbddec 
59c6b78d4b3ff8705934ca7c8a6b9d307a74e92ddca904f24efa76663cccf36e.exe 81920 1, 0, 0, 181dd1d02ac2e2fd7b1d6f0e3a416799f 
48b2a618185f932a42407320b0c360d8.vxe.exe 81920 1, 0, 0, 148b2a618185f932a42407320b0c360d8 
54fee4bd02712356319af92f3f38a55b.vir.dll 50176 1.0.0.054fee4bd02712356319af92f3f38a55b 
59c6b78d4b3ff8705934ca7c8a6b9d307a74e92ddca904f24efa76663cccf36e.exe 81920 1, 0, 0, 181dd1d02ac2e2fd7b1d6f0e3a416799f01/02/2020
1d3dfab7dc8a53371ec4206cf9f6e332.vir.exe 361432  1d3dfab7dc8a53371ec4206cf9f6e332 
9841bb8312343fb273206660c206b4217afcfe2e7c258c3df280bf081b866604.exe 118784 1, 0, 0, 1cd3807dc722088e9de4c0442214ae4f3 
d39784cd0d4d853682766bb249fbddec.exe 255454 1, 0, 0, 1d39784cd0d4d853682766bb249fbddec 
e9d8da52344e3ef74c026bbad771f5a0195a4c416ad0f696e5c815bc2481465e.exe 183808  73c790ed64704d0aab3fa05b78aa84d6 
4db6587ffc35948c40099b44a564aec4.vXE.exe 81920 1, 0, 0, 14db6587ffc35948c40099b44a564aec4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware