Home / Spyware Encyclopedia / Exploit.Agent.aw << Back

Recommendation to Automatically remove Exploit.Agent.aw


Our products can remove Exploit.Agent.aw and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.aw Details


  • Category Exploit
  • Discovered 1/11/2013 6:06:30 PM
  • Modified 12/12/2020 2:41:28 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b69cf139ab899e5e4f50f7b70397ff2e089a4fa560df9ad77ebe33934a97094b 10345  160d9c55ad0d4498c9b1647cdf005985 
cc6663cea7ef6948b92b5aec03b76d5fbe4817b4.bin 50681  b535d3b67efcf39a1ebb71eb83437627 
44d2aa31d2bac373867bf9cf9019d348.exe 10752  44d2aa31d2bac373867bf9cf9019d348 
7b670690623dac2c67cec4b1494675d9 10347  7b670690623dac2c67cec4b1494675d9 
5efda4525e864d7f1541a79f077b08b9 10336  5efda4525e864d7f1541a79f077b08b9 
427fad31d67ae50e87504930d530fd07 50782  427fad31d67ae50e87504930d530fd07 
8b2491ecac22ff78491d90644dd27cc6 10343  8b2491ecac22ff78491d90644dd27cc6 
042a0d6cfe8a341a021c57660329e3ab3c79351dcd1ffafc6cdf09ff5e0db9d2 10350  47890c80ee37b9805158cd750c91bc3e 
cce0b821e220eb65867fef7b60206ff6 3782  cce0b821e220eb65867fef7b60206ff6 
36d6addc3048c1bda34a54ec392856a3.vir 50672  36d6addc3048c1bda34a54ec392856a3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware