Home / Spyware Encyclopedia / Exploit.Agent.bko << Back

Recommendation to Automatically remove Exploit.Agent.bko


Our products can remove Exploit.Agent.bko and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.bko Details


  • Category Exploit
  • Discovered 1/21/2012 2:45:41 AM
  • Modified 4/5/2012 10:44:07 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
057df753e12eca0b0adfa7b829699dac.php 79959  057df753e12eca0b0adfa7b829699dac 
24a3f0d0fd0a5a2288952694c3340bb2 80157  24a3f0d0fd0a5a2288952694c3340bb2 
a516637d6523969877287f98b405dfd5 75635  a516637d6523969877287f98b405dfd5 
bef611e3a1e4fc7f0a998026f0427b2b 80041  bef611e3a1e4fc7f0a998026f0427b2b 
a4db4149e2c1bbc2be457cc1f96617b1.ex 71452  a4db4149e2c1bbc2be457cc1f96617b1 
ed4ab0d451aac1325b450b718006fe78.php 75840  ed4ab0d451aac1325b450b718006fe78 
0b52b6c2f39bd0c4b1b2b3f898cf763c.vir 78394  0b52b6c2f39bd0c4b1b2b3f898cf763c 
24d73523384aaa4cab379bcdea561373c2f2f809 84716  e11750f84e73362cfc257fa035e2f78f 
382e3e80609d4e3318d549743f0f8306.vxe 85145  382e3e80609d4e3318d549743f0f8306 
95cc562056b7de9de5ebf076b99e408e.tx 72076  95cc562056b7de9de5ebf076b99e408e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware