Home / Spyware Encyclopedia / Exploit.Agent.gw << Back

Recommendation to Automatically remove Exploit.Agent.gw


Our products can remove Exploit.Agent.gw and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.gw Details


  • Category Exploit
  • Discovered 11/28/2023 2:45:22 AM
  • Modified 11/28/2023 6:54:25 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
08d1c5e46b0e4182b8b733a49f7caedc8fb95e081239c4e29c753f2c4014d1a1.mrg.exe 290816  6248680f678b6452b551f03b210d5ada28/11/2023
b1ef585550c32a7227528d57f7aca3603d4f6b38.bin.exe 288768  a289503ba5231e8789e2e4dcd653a6c913/04/2023
exploit.win32.agent.gw.1b83862e7dec0d6680f9ef391d8240c5.exe 288768  1b83862e7dec0d6680f9ef391d8240c522/04/2020
f6cfc11b8efe7f4463f0def4c403329d.vir.exe 618496  f6cfc11b8efe7f4463f0def4c403329d 
61859b8c8b78b20b41df7b78ad85fca0.vir.exe 59392Lenovo1.0.418.180061859b8c8b78b20b41df7b78ad85fca0 
067a630a331c405f85de4de78b4e7c00.vir.exe 230912  067a630a331c405f85de4de78b4e7c00 
077fd6c61de1437ecb9e7b2b5549b9dd.vir.exe 82432  077fd6c61de1437ecb9e7b2b5549b9dd 
0febcb390bae7c9919f2b13a7509cfd7.vir.exe 51200  0febcb390bae7c9919f2b13a7509cfd7 
22072817a13fed2ab6b2fc7b606b3b40.vir.exe 289280  22072817a13fed2ab6b2fc7b606b3b40 
e038b6ad3ead6a94f4487e18f6519d42.vir.exe 51200  e038b6ad3ead6a94f4487e18f6519d42 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware