Home / Spyware Encyclopedia / Exploit.Downloader.nj << Back

Recommendation to Automatically remove Exploit.Downloader.nj


Our products can remove Exploit.Downloader.nj and thousands of other Virus and Spyware automatically and instantly.

Exploit.Downloader.nj Details


  • Category Exploit
  • Discovered 9/12/2013 8:26:06 PM
  • Modified 3/15/2019 9:50:31 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b0e631d1cd5071c9834917a6834befe4e304a88f36eda0465e7c5c05456e13de 17893  89037eb84e26ddaf83edaada8d759b26 
4bc61450bd04c4cf58249b60aeb85e37.vir 17893  4bc61450bd04c4cf58249b60aeb85e37 
9b06c9a641c1f194280a8e44e88b0ce8.vir 17891  9b06c9a641c1f194280a8e44e88b0ce8 
6e993de0d2d01b0d75b2ec1d28e2657b.vir 17896  6e993de0d2d01b0d75b2ec1d28e2657b 
991bccdcabcd4ad3ec7bf735e22a9803.vir 17894  991bccdcabcd4ad3ec7bf735e22a9803 
b95b8c5acb912a87bee3b0502573512b.vir 17894  b95b8c5acb912a87bee3b0502573512b 
529eaabd2433a59cbe78ce0aadd24670.vir 17896  529eaabd2433a59cbe78ce0aadd24670 
e36c16c5b6df0c491d84323b81cc3446.vir 17893  e36c16c5b6df0c491d84323b81cc3446 
83c136699dc4afc6fe4f2674e32c3dc32df59d1768b8b68043e417fba07279a9 17892  f7d263280025a8073d011e73c32209a0 
712e1d280f0b192ab1c2f0ba0a1970f4274aeb5479359a407c4e6ba1894fd860 17888  0109bf929ce87dbb005efa8431285ce9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware