Home / Spyware Encyclopedia / Exploit.img-wmf.pi << Back

Recommendation to Automatically remove Exploit.img-wmf.pi


Our products can remove Exploit.img-wmf.pi and thousands of other Virus and Spyware automatically and instantly.

Exploit.img-wmf.pi Details


  • Category Exploit
  • Discovered 4/10/2010 7:17:21 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Medium
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cd2896de.exe 25088Microsoft Corporation5.1.2600.21807011ec15b109616e853e4ed7fc79b7d2 
0638444_000112640-45802e87_5cadd24b5921a79879d2d236e3bf0a08.exe 112640Microsoft Corporation5.1.2600.21805cadd24b5921a79879d2d236e3bf0a08 
c52b2112.exe 25088Microsoft Corporation5.1.2600.218010f5c3b7e2faaca9703ce3dd46075183 
c6880de8.exe 25088Microsoft Corporation5.1.2600.218027f5ca319854f4cd883812b85bd47c04 
b09d6948.exe 25088Microsoft Corporation5.1.2600.21802cb9521561ceada6feb265f45c3cb1fc 
e7121c5d.exe 25088Microsoft Corporation5.1.2600.21802cd06afcc3c1f8bc428af711175f9f1e 
7c64c30a.exe 25088Microsoft Corporation5.1.2600.21806604b8b2e6a2574fb1a3be012e1982ed 
3b88573f.exe 25088Microsoft Corporation5.1.2600.2180692beff77cc94a7326e7c9496b3f082e 
29a1a2b4.exe 23552Microsoft Corporation5.1.2600.21806a8cf72fc87f73479f0e84e520f4cb1d 
ba9f4a75.exe 25088Microsoft Corporation5.1.2600.21806b343083c85ce93112c0f4fde2bc0ffe 

The following Registry Entries were created:
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\processsafe.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\arswp.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\ravstub.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SUPERKILLER.EXE\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrvAnti.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RawCopy.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SelfUpdate.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qqdoctormain.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upiea.exe\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware