Home / Spyware Encyclopedia / Exploit.Mht << Back

Recommendation to Automatically remove Exploit.Mht


Our products can remove Exploit.Mht and thousands of other Virus and Spyware automatically and instantly.

Exploit.Mht Details


  • Category Exploit
  • Discovered 4/10/2010 7:17:21 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Medium
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
EE363532.EXE 191  afb82235ac19dcb1af61711d374e3d51 
45e830db2cb9359502c2771c62363a51 3033  45e830db2cb9359502c2771c62363a51 
672bd85ccb19e934663de6f7a6f662d9 15259  672bd85ccb19e934663de6f7a6f662d9 
8eadf95115d62deff01629dbce840deb 15259  8eadf95115d62deff01629dbce840deb 
935b7457ba7fa5e6114f81415dfcfd0a 12958  935b7457ba7fa5e6114f81415dfcfd0a 
f874a17a4b98d107de845c19d3a1cac6 3478  f874a17a4b98d107de845c19d3a1cac6 
d01706789071934de7815fcefeb9f0c8359bb704c8457d47125a188ac8c3aa7c.htm 19036  ec23043bcd79036864a91fef28c41cca 
ce26e31f407ab38456e694abe3b4db71 186  ce26e31f407ab38456e694abe3b4db71 
72ed5689849fa7ba9c759c03f8e225a6 126  72ed5689849fa7ba9c759c03f8e225a6 
ceb7cfa82180d629e2ae25614218f926 72  ceb7cfa82180d629e2ae25614218f926 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware