Home / Spyware Encyclopedia / Exploit.img-wmf.fk << Back

Recommendation to Automatically remove Exploit.img-wmf.fk


Our products can remove Exploit.img-wmf.fk and thousands of other Virus and Spyware automatically and instantly.

Exploit.img-wmf.fk Details


  • Category Exploit
  • Discovered 1/6/2013 4:55:03 AM
  • Modified 7/31/2023 5:22:32 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
safebox.exe 3740  d2c3349a566a814a3d793f82ad7d8a65 
mxc.exe 10489505  9f6b564698f2cc796718c7ccdaf11e0d 
bip.exe 10489506  f5bf5e1e327b44d55e4f32943181739a 
abm.exe 10489506  e0b76cc2797deb9652fbbd662c970a12 
fedeb6d5e5e1261f7d24cae03513b887e878717df0457585fd162628c357f701.exe 8192  36d7e3e5dc6eb51028fafadddf760f7b 
a674be856397725b58601aa3ad7213682b74bfefbb24a76c33599a1baecc66bb.exe 6643  99f4c5bc685244eeea8071af77f02ee7 
880873782b76c5793ad5be32cbd5714bc43987fd.bin.exe 5246626  6694bd90eeb3b5ee9d583f1ba2fa8ea1 
eju35.exe 5246625  af0629ced7bf5c2f19c2d1980019465f 
wrm35.exe 5246625  469e8c9a26b1c7caf60069aa71bb37fd 
9f88e541e2132f074584d75b546d733262255969e1c45e90cc35d4020011952c.exe 97289  946096e826e423a4aa8e8d3b00ebd70c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware