Home / Spyware Encyclopedia / Exploit.IMG-ANI.gen << Back

Recommendation to Automatically remove Exploit.IMG-ANI.gen


Our products can remove Exploit.IMG-ANI.gen and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-ANI.gen Details


  • Category Exploit
  • Discovered 3/28/2011 1:08:34 PM
  • Modified 2/22/2019 11:39:31 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1a98c6daa6bb266589651d294ccd7615.vir 1156  1a98c6daa6bb266589651d294ccd7615 
5873c6b54a9adeca0465afebd3d3c421.vir 1162  5873c6b54a9adeca0465afebd3d3c421 
fa880655c69dc4c58e0df496a3aacac1.vir 1216  fa880655c69dc4c58e0df496a3aacac1 
be311a4cc0bb26b96dd4788f8daf309d.vir 1142  be311a4cc0bb26b96dd4788f8daf309d 
db6dbc93458bd991558d43297e418716.vir 1234  db6dbc93458bd991558d43297e418716 
e151426b042b533b4441602b15fd169c.vir 1150  e151426b042b533b4441602b15fd169c 
f25ae3990bb7e9e686072cdcd2738ea2.vir 1248  f25ae3990bb7e9e686072cdcd2738ea2 
d67cac900cd738fbe59fa691a8ac33ed.vir 1242  d67cac900cd738fbe59fa691a8ac33ed 
7a290c14c10aaa4539632c2b446f8119.vir 1236  7a290c14c10aaa4539632c2b446f8119 
602691622084a9166b51e91768876df8.vir 1232  602691622084a9166b51e91768876df8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware