Home / Spyware Encyclopedia / Exploit.IMG-ANI.dd << Back

Recommendation to Automatically remove Exploit.IMG-ANI.dd


Our products can remove Exploit.IMG-ANI.dd and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-ANI.dd Details


  • Category Exploit
  • Discovered 4/29/2010 8:03:22 PM
  • Modified 7/4/2022 2:14:59 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cpu¼ÓËÙ20%-30%.exe 44544水晶情缘工作室2006.0.0.0da2d7492c4f3fb0e35e9cda8d4ee07d8 
ee532f19bc35daf4f833f83ec66947fb9a519159d3df048db6feac909d47665bf84a3d362f9e1c7d8af11a6c14c1e004e20.exe 192000水晶情缘工作室2006.00d6b678f97770506fd25e6dd8e594b4a3 
c57d100b9956ad43047b17d1fcf41794.vxe.exe 192000水晶情缘工作室2006.00c57d100b9956ad43047b17d1fcf41794 
a3d2984570996d6339bac64bcf11b087.exe 80896水晶情缘工作室2006.00a3d2984570996d6339bac64bcf11b087 
62dbf70010e3b3c4aa761c07199c76ba.exe 150155  62dbf70010e3b3c4aa761c07199c76ba 
5993824b69b8c757e3fb2e80e265cf11.exe 707667  5993824b69b8c757e3fb2e80e265cf11 
812c309b78e87d58f3fc321e70c29c2f.vxe.exe 44544水晶情缘工作室2006.00812c309b78e87d58f3fc321e70c29c2f 
cc7f2e6e758aed24569006195614aa61.vir.exe 192000水晶情缘工作室2006.00cc7f2e6e758aed24569006195614aa61 
0bce00dfc9106d7453e5768ae809541a.vir.exe 150117  0bce00dfc9106d7453e5768ae809541a 
942af59b61a19e89f44b4824d20a29b7.vir.exe 192000水晶情缘工作室2006.00942af59b61a19e89f44b4824d20a29b7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware