Home / Spyware Encyclopedia / Exploit.img-wmf.fk << Back

Recommendation to Automatically remove Exploit.img-wmf.fk


Our products can remove Exploit.img-wmf.fk and thousands of other Virus and Spyware automatically and instantly.

Exploit.img-wmf.fk Details


  • Category Exploit
  • Discovered 4/25/2010 10:53:20 PM
  • Modified 10/23/2024 12:13:25 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4c90a304.exe 1468281  70d92330f67485cf2c10f287167e2264 
system.exe 5120  8f45d00b543b3ee117e2793c5d62c02f 
mxc.exe 10489505  9f6b564698f2cc796718c7ccdaf11e0d 
zir8.exe 10489506  2864d662724461cf117969d01cfa51e1 
hev8.exe 10489506  1dcfab73d0673b8f8f7f4ca492a33bd0 
jwx4.exe 10489506  509dfafad4232e2f147db3a243f8c2e7 
jex1.exe 3149474  57cc7078cf957172c25e6e1be9527352 
tet4.exe 5246626  181a5a67cc32a74eb85676ac76651186 
fedeb6d5e5e1261f7d24cae03513b887e878717df0457585fd162628c357f701.exe 8192  36d7e3e5dc6eb51028fafadddf760f7b 
f94bbf486571a3e28fe166d3d1d9c249a39e0abe84dd785f33b41060814c3efc.exe 7168  b848d0bc7daa1a1ddd6e5856175c2ce0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware