Home / Spyware Encyclopedia / Exploit.Agent.ii << Back

Recommendation to Automatically remove Exploit.Agent.ii


Our products can remove Exploit.Agent.ii and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.ii Details


  • Category Exploit
  • Discovered 5/29/2014 8:09:05 PM
  • Modified 2/26/2015 11:59:09 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4233c65ebaa35256aca49ddaeae2d1bc.vir 6141  4233c65ebaa35256aca49ddaeae2d1bc 
0d239fc87934a7e3ab2adbc06e5c5e64.vir 6604  0d239fc87934a7e3ab2adbc06e5c5e64 
809966c79e4944e9d7c69f3161b475ff.vir 6195  809966c79e4944e9d7c69f3161b475ff 
3351d83a560ddfab8ec309f04dec32c0.vir 6304  3351d83a560ddfab8ec309f04dec32c0 
e921a9d383e34813fb7486e88b9c60e5.vir 6258  e921a9d383e34813fb7486e88b9c60e5 
7460394d9a4feaebef0cbb41f62a452b.vir 6672  7460394d9a4feaebef0cbb41f62a452b 
4848a2c3cd6e874b6ec1413434c98ab4.vir 6295  4848a2c3cd6e874b6ec1413434c98ab4 
be5fd0d435c10423a818101059c4c883.vir 6063  be5fd0d435c10423a818101059c4c883 
b67a4fd9c4e481731190035d94f0da52.vir 6489  b67a4fd9c4e481731190035d94f0da52 
40fd69626f5248012b6d5bd2e4d2fc9b.vir 6232  40fd69626f5248012b6d5bd2e4d2fc9b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware