Home / Spyware Encyclopedia / Exploit.Agent.bl << Back

Recommendation to Automatically remove Exploit.Agent.bl


Our products can remove Exploit.Agent.bl and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.bl Details


  • Category Exploit
  • Discovered 10/22/2018 2:55:54 PM
  • Modified 8/16/2022 1:52:03 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
19371600002b4933b8566e41cef733a714a35d737863a63667d10ee277451a0382d9a71ae2a7847c6d5b2654e338f.exe 188416  1facb1696e09df0372d9f6cf128340b9 
5fa600bc3e290e3c0dd326b54b3f6254.exe 189952  5fa600bc3e290e3c0dd326b54b3f6254 
lib_mysqludf_sys_32.dll 6656  aba03ff7d4763241f75594e1d526418912/08/2022
778103a9008deb7315a7e86f455e22f0.vir 748  778103a9008deb7315a7e86f455e22f0 
520b58ed37e9b336935b52ff4490aff5.vir 1120  520b58ed37e9b336935b52ff4490aff5 
3bacf0b31f9d7e33ce3ea61ea053bb51.vir 748  3bacf0b31f9d7e33ce3ea61ea053bb51 
7f885f5f3e94a35e804ce1cafc20158b 1120  7f885f5f3e94a35e804ce1cafc20158b 
be27bf92d18159fbc35d9f5f6344e238 1120  be27bf92d18159fbc35d9f5f6344e238 
193556076523b97565784568ffefecea31f1d71afcdff800995aff9bc2bca6ec4de5e9d3c83b0903170c9b908c1e2.exe 187999  53acc1d68998db91033d296546e69a62 
31fd1382ca94db13c26e6aff3ef464a9.exe 373767  31fd1382ca94db13c26e6aff3ef464a9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware