Home / Spyware Encyclopedia / Exploit.Agent.aw << Back

Recommendation to Automatically remove Exploit.Agent.aw


Our products can remove Exploit.Agent.aw and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.aw Details


  • Category Exploit
  • Discovered 1/11/2013 6:06:30 PM
  • Modified 12/12/2020 2:41:28 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
44d2aa31d2bac373867bf9cf9019d348.exe 10752  44d2aa31d2bac373867bf9cf9019d348 
5efda4525e864d7f1541a79f077b08b9 10336  5efda4525e864d7f1541a79f077b08b9 
36d6addc3048c1bda34a54ec392856a3.vir 50672  36d6addc3048c1bda34a54ec392856a3 
de056698058c44f02955f88596722d14.swf 10347  de056698058c44f02955f88596722d14 
44d2aa31d2bac373867bf9cf9019d348.exe 10752  44d2aa31d2bac373867bf9cf9019d34812/12/2020
12cdc77bdbf3d75a9c3ae148bec1133c.vir 10345  12cdc77bdbf3d75a9c3ae148bec1133c 
55a66fbdda7c785f38394c15ed8ce5e9.vir 10346  55a66fbdda7c785f38394c15ed8ce5e9 
98674492eee8444c9c34242cba423dd3.vir 10347  98674492eee8444c9c34242cba423dd3 
cce0b821e220eb65867fef7b60206ff6 3782  cce0b821e220eb65867fef7b60206ff6 
8225f21ff808332de0d9b0bb3d03f955318967e59385a85fb3ccc69a17206db4 10347  c623adce5833fd1428290c471e9ff50e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware