Home / Spyware Encyclopedia / Exploit.JS.Pdfka.fhg << Back

Recommendation to Automatically remove Exploit.JS.Pdfka.fhg


Our products can remove Exploit.JS.Pdfka.fhg and thousands of other Virus and Spyware automatically and instantly.

Exploit.JS.Pdfka.fhg Details


  • Category Exploit
  • Discovered 2/20/2019 3:06:14 PM
  • Modified 2/22/2019 4:51:22 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f22a2ad942a64a2a2a77c91483a61a2d8749ca26.bin 135061  46e7f8a60349477aa4f888c1b1daca6e 
ff487bab0b8c44b31fcb842bc5f2a1ff.vir 136031  ff487bab0b8c44b31fcb842bc5f2a1ff 
c1b947989a503d0665cac1dfc2ced84b.vir 119686  c1b947989a503d0665cac1dfc2ced84b 
0b0c960793a643e841b1011fb30b62fb.vir 136000  0b0c960793a643e841b1011fb30b62fb 
26bbf56c0a81bf1b74f2dfb873c4d36f.vir 118885  26bbf56c0a81bf1b74f2dfb873c4d36f 
fbb7968fbbbe77e450db729c114b32d5.vir 118903  fbb7968fbbbe77e450db729c114b32d5 
d53e41184efdaa467e74abab32fba9b3.vir 119552  d53e41184efdaa467e74abab32fba9b3 
fe7d47ce2a654256cf068efcc4775c8a.vir 119399  fe7d47ce2a654256cf068efcc4775c8a 
521af46d988aacaac57ff1d96dc06af9.vir 119773  521af46d988aacaac57ff1d96dc06af9 
5f17b1a16759eb0c94afab2aa6e41cb4.vir 119105  5f17b1a16759eb0c94afab2aa6e41cb4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware