Home / Spyware Encyclopedia / Exploit.Agent.bjy << Back

Recommendation to Automatically remove Exploit.Agent.bjy


Our products can remove Exploit.Agent.bjy and thousands of other Virus and Spyware automatically and instantly.

Exploit.Agent.bjy Details


  • Category Exploit
  • Discovered 12/19/2011 12:58:48 AM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb2f3bdb2bca7f2c7df5e75b5ca9cf888210970a 88990  e945db0a2b1276c66e51fd71887831b8 
a91d04e497082d4d98146936e68b01e6.sy_ 89305  a91d04e497082d4d98146936e68b01e6 
40e0697c58b66e0a4603dfd3b8903896.htm 87823  40e0697c58b66e0a4603dfd3b8903896 
08eba1647285523b7f2ca95e70018499.sy 102838  08eba1647285523b7f2ca95e70018499 
508d14fd0bcf9b80fb0e8b1098045bfd 89344  508d14fd0bcf9b80fb0e8b1098045bfd 
f76da0be19897704638cd6d9dd08ccc9.tmp 87863  f76da0be19897704638cd6d9dd08ccc9 
c6ef9da865ea9cf29266a85c33a0a540 103278  c6ef9da865ea9cf29266a85c33a0a540 
1f0a1add0112b1fc82931198fb1b6263 96699  1f0a1add0112b1fc82931198fb1b6263 
1fd235462a00a64d8edbc5ee5bfa5469.ex 87763  1fd235462a00a64d8edbc5ee5bfa5469 
0d69bfd5510140505a822e8e7cb4095e.sy_ 102838  0d69bfd5510140505a822e8e7cb4095e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware