The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1


Detected Apr 28 2011 19:52 GMT
Released Apr 29 2011 02:02 GMT
Published Sep 08 2011 08:44 GMT

Technical Details
Removal instructions

Technical Details

An exploit that uses a vulnerability in the Web-browser for its implementation on the user's computer. It is a HTML-page containing JavaScript. It has several versions of around 3-4 kB.


When launched, the exploit downloads a file from a link. Depending on the version, the exploit may download the file from different links, for example:

When creating the description, two files were downloaded from some of the indicated links. One file is 16372 bytes and is detected by Kaspersky Antivirus as Trojan-Downloader.Win32.Agent.ssax. The second file is 25088 bytes and is detected by Kaspersky Antivirus as Trojan-Downloader.Win32.Geral.vnk. The downloaded file is saved under the following name:
The downloaded file is then launched and the exploit shuts down.

Removal instructions

If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:

  1. Delete the original program file (its location on the infected computer will depend on how the program got onto the computer).
  2. Clear the Temporary Internet Files directory which may contain infected files (How to delete infected files in the Temporary Internet Files folder?):
    %Temporary Internet Files%
  3. Delete the following file:
  4. Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).

Bookmark and Share

Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes.

Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user.

Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.

Other versions


Exploit.JS.Agent.bgz (Kaspersky Lab) is also known as:

  • Troj/ExpJS-R (Sophos)
  • JS.Agent-90 (ClamAV)
  • Exploit:JS/CVE-2010-0806.gen!A (MS(OneCare))
  • JS:CVE-2010-0806-CV [Expl] (AVAST)
  • Exploit (AVG)
  • JS/ShellCode.B (Norman)
  • Hack.Exploit.Script.JS.Agent.ju (Rising)