Home / Spyware Encyclopedia / Exploit.IFrameBof << Back

Recommendation to Automatically remove Exploit.IFrameBof


Our products can remove Exploit.IFrameBof and thousands of other Virus and Spyware automatically and instantly.

Exploit.IFrameBof Details


  • Category Exploit
  • Discovered 12/7/2007 3:56:00 PM
  • Modified 7/15/2020 3:40:44 PM
  • Threat Level Medium
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a2b5ce0ee89beb8be0779586ee88c30 1120  4a2b5ce0ee89beb8be0779586ee88c30 
dd6d765d9147f62a34d6afc4f4b8eecef39c5867e25f06960a7f5742369c727f 5658  fab758a0b72479ce6dede275b2fbae62 
ebe443d2b97ca7d18dafab048d26d24f.vxe.exe 32768红客工作室1.002cbf52e3b1811ce4194f5a5616775619 
0dc454a08d32dfe77b69773158b804fa.vir 6085  0dc454a08d32dfe77b69773158b804fa 
5f434209eda96e9ea566871b28e5dae4 5633  5f434209eda96e9ea566871b28e5dae4 
20b04eda0ca098063d3b6cb3bb9343e5 5637  20b04eda0ca098063d3b6cb3bb9343e5 
badc645d093d4aee17280d3af4706189 5756  badc645d093d4aee17280d3af4706189 
b0d1e346fd2204e07efe0c1ecb42df71.js 45992  b0d1e346fd2204e07efe0c1ecb42df71 
c31e7e061f850d24a20fd4d2cdb70439 5667  c31e7e061f850d24a20fd4d2cdb70439 
2706bbe1f775df9dcb0382f47ed4e463 1546  2706bbe1f775df9dcb0382f47ed4e463 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware