Home / Spyware Encyclopedia / Exploit.img-wmf.wz << Back

Recommendation to Automatically remove Exploit.img-wmf.wz


Our products can remove Exploit.img-wmf.wz and thousands of other Virus and Spyware automatically and instantly.

Exploit.img-wmf.wz Details


  • Category Exploit
  • Discovered 6/27/2009 8:44:28 PM
  • Modified 9/26/2012 11:32:24 AM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3fa0e125.exe 23552Microsoft Corporation5.1.2600.2180 (xpsp4d8d6e3b44d9fad68ea7ea30784ac403 
ntldr.exe 23552Microsoft Corporation5.1.2600.2180 (xpsp4d8d6e3b44d9fad68ea7ea30784ac403 
35d399ea06436c24cff736ad7f721e7b7f73bf1bf43a9531dde306f53dee1934.exe 17680Microsoft Corporation5.1.2600.2180 (xpsp036c3205166be6fcfdbcb400cc4adbbb 
e5c55404.exe 15108Microsoft Corporation5.1.2600.21808c5c22d6025ef6056b2d230c92ea81ba 

The following Registry Entries were created:
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\processsafe.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\arswp.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\ravstub.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SUPERKILLER.EXE\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrvAnti.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RawCopy.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SelfUpdate.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qqdoctormain.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upiea.exe\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware