Home / Spyware Encyclopedia / Exploit.IMG-WMF.axd << Back

Recommendation to Automatically remove Exploit.IMG-WMF.axd


Our products can remove Exploit.IMG-WMF.axd and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-WMF.axd Details


  • Category Exploit
  • Discovered 6/8/2010 1:23:45 PM
  • Modified 3/12/2024 12:54:33 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
C1068F42.EXE 25088  7c6cb2a705938e76bdb681c65ee57a4c 
c1068f42.exe 25088Microsoft Corporation5.1.2600.21807c6cb2a705938e76bdb681c65ee57a4c 
caccb3e1.exe 25088Microsoft Corporation5.1.2600.218078f9c99706ae8aaff711bde1a633eef4 
4b40569c.exe 102400Microsoft Corporation5.1.2600.21805c2385100bfcec47126c77ee1ca7c88f 
09c419196cba12f2760aea2979637efa.vxe.exe 25088Microsoft Corporation5.1.2600.2180 (xpsp09c419196cba12f2760aea2979637efa 
13054509530a665f2b55e77fbefc30f5438d4a02faa0df20de6dba9dc502958ebf1a669340d3baebb1408c71bbc93.exe 25088  17116b6eb0561387af16579c166e9dc7 
05b9f90d92b1f193a422de692ca5fcfa.vXE.exe 25088Microsoft Corporation5.1.2600.2180 (xpsp05b9f90d92b1f193a422de692ca5fcfa04/05/2020
DDEEE9F5.EXE 21236  0638626c9fab09edc8e5f0ed8665d60b 
e1d6dcf2.exe 20480  8cb2a5633e557ef112e7636649d1815112/03/2024
576a13dc79d317806f570615078af81a.exe 102400Microsoft Corporation5.1.2600.2180 (xpsp576a13dc79d317806f570615078af81a02/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware