Home / Spyware Encyclopedia / Exploit.IMG-ANI.dd << Back

Recommendation to Automatically remove Exploit.IMG-ANI.dd


Our products can remove Exploit.IMG-ANI.dd and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-ANI.dd Details


  • Category Exploit
  • Discovered 4/29/2010 8:03:22 PM
  • Modified 7/4/2022 2:14:59 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cpu¼ÓËÙ20%-30%.exe 44544水晶情缘工作室2006.0.0.0da2d7492c4f3fb0e35e9cda8d4ee07d8 
637711df.exe 142177  629a1a96b29a134759406bb5574ea4d3 
ee532f19bc35daf4f833f83ec66947fb9a519159d3df048db6feac909d47665bf84a3d362f9e1c7d8af11a6c14c1e004e20.exe 192000水晶情缘工作室2006.00d6b678f97770506fd25e6dd8e594b4a3 
c57d100b9956ad43047b17d1fcf41794.vxe.exe 192000水晶情缘工作室2006.00c57d100b9956ad43047b17d1fcf41794 
812c309b78e87d58f3fc321e70c29c2f.vxe.exe 44544水晶情缘工作室2006.00812c309b78e87d58f3fc321e70c29c2f 
cc7f2e6e758aed24569006195614aa61.vir.exe 192000水晶情缘工作室2006.00cc7f2e6e758aed24569006195614aa61 
0bce00dfc9106d7453e5768ae809541a.vir.exe 150117  0bce00dfc9106d7453e5768ae809541a 
942af59b61a19e89f44b4824d20a29b7.vir.exe 192000水晶情缘工作室2006.00942af59b61a19e89f44b4824d20a29b7 
f2e39e3af199c4addf1ab0e9fee80a1e.vir.exe 74752水晶情缘工作室2006.00f2e39e3af199c4addf1ab0e9fee80a1e 
812c309b78e87d58f3fc321e70c29c2f.vxe.exe 44544水晶情缘工作室2006.00812c309b78e87d58f3fc321e70c29c2f14/08/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware