Home / Spyware Encyclopedia / Exploit.IMG-WMF.axd << Back

Recommendation to Automatically remove Exploit.IMG-WMF.axd


Our products can remove Exploit.IMG-WMF.axd and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-WMF.axd Details


  • Category Exploit
  • Discovered 6/8/2010 1:23:45 PM
  • Modified 3/12/2024 12:54:33 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
DDEEE9F5.EXE 21236  0638626c9fab09edc8e5f0ed8665d60b 
caccb3e1.exe 25088Microsoft Corporation5.1.2600.218078f9c99706ae8aaff711bde1a633eef4 
fcec2895.exe 21236microsoft corporation5.1.2600.218051304c6f55005c1b20d4b11c974005a3 
ceca68c4.exe 21236microsoft corporation5.1.2600.21809d5da9fba90cb8c640f0dbe493db7be9 
qvodsetuplus.exe 21236microsoft corporation5.1.2600.21805a5879e2a76019791f81e53883d8c2c4 
e1d6dcf2.exe 20480  8cb2a5633e557ef112e7636649d18151 
4b40569c.exe 102400Microsoft Corporation5.1.2600.21805c2385100bfcec47126c77ee1ca7c88f 
4443621fb2cf40c7908d4cd984681ff6.exe 21037  4443621fb2cf40c7908d4cd984681ff6 
13054509530a665f2b55e77fbefc30f5438d4a02faa0df20de6dba9dc502958ebf1a669340d3baebb1408c71bbc93.exe 25088  17116b6eb0561387af16579c166e9dc7 
0746662_000104716-B3644ADA_c230debce6bacfe478be20dbd2f68697.EXE 0Microsoft Corporation5.1.2600.2180 (xpspc230debce6bacfe478be20dbd2f6869719/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware