Home / Spyware Encyclopedia / Exploit.Agent.ad << Back

Recommendation to Automatically remove Exploit.Agent.ad


Our products can remove Exploit.Agent.ad and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.ad Details


  • Category Exploit
  • Discovered 10/10/2011 10:59:34 PM
  • Modified 6/5/2019 2:29:58 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1c5504a2743f75636e21beabd242f308.vxe.exe 90112 1, 0, 0, 11c5504a2743f75636e21beabd242f308 
24ccb0281bd795d511a2c5971aa6df07.vir.exe 90112 1, 0, 0, 124ccb0281bd795d511a2c5971aa6df07 
0BB58F87.EXE 28676 1.0.0.164fb968ca9dac60e81341f4280ea280b20/07/2023
9573e7e2e9c66376e680a534e74f1400.vir.exe 1012736  9573e7e2e9c66376e680a534e74f1400 
f194a26fc158a62bdf88101028c9855f.vir 1169  f194a26fc158a62bdf88101028c9855f 
ad9d4ce6361628d1e7774709f53704af.vir 1201  ad9d4ce6361628d1e7774709f53704af 
e12ddb3fe1bcccfc6ea80129d24f8936.vir.exe 28672 1, 0, 0, 1e12ddb3fe1bcccfc6ea80129d24f8936 
8efe9c4907a60dee9b9b994ef6bb3a78 961  8efe9c4907a60dee9b9b994ef6bb3a78 
a5ed38d0e1e9e975ec2d014957886d2e 961  a5ed38d0e1e9e975ec2d014957886d2e 
d472f1b1f142ce8e3f2c8ca046811635 984  d472f1b1f142ce8e3f2c8ca046811635 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware