Home / Spyware Encyclopedia / Exploit.Agent.bkn << Back

Recommendation to Automatically remove Exploit.Agent.bkn


Our products can remove Exploit.Agent.bkn and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.bkn Details


  • Category Exploit
  • Discovered 1/14/2012 12:02:37 AM
  • Modified 4/2/2012 3:43:59 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
59172dc77fe21c0e16ef6818f76dce910a0f0996 75547  0d65fcc384aaa37fcf0146d4633814ed 
04adc32cb4edc0616f2f6eac7ca0caab424acd63 136175  e270a737478631b2ea73a6715dbc71ec 
4a81cefd271feb5cd6645552f7b63fb6 128587  4a81cefd271feb5cd6645552f7b63fb6 
10aa49b1352aa0776c2484928427ca6c.dl 136053  10aa49b1352aa0776c2484928427ca6c 
638123aafa9e9707a649915ea61dc6ec.ex 122426  638123aafa9e9707a649915ea61dc6ec 
55e9a6a4b5276d999ec291bb05b33f06 76374  55e9a6a4b5276d999ec291bb05b33f06 
52ad5b88f1f42fbc3c91b1fa544cc7ac 76374  52ad5b88f1f42fbc3c91b1fa544cc7ac 
9b9a4985dc725353a61fc602e7d386ee.tx# 136068  9b9a4985dc725353a61fc602e7d386ee 
7e4c862bff05f2b5608b8eecd13b7704 80057  7e4c862bff05f2b5608b8eecd13b7704 
a327fa6ba170e3ce4beff9f5ba31826e.vxe 122426  a327fa6ba170e3ce4beff9f5ba31826e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware