Home / Spyware Encyclopedia / Exploit.Mht << Back

Recommendation to Automatically remove Exploit.Mht


Our products can remove Exploit.Mht and thousands of other Virus and Spyware automatically and instantly.

Exploit.Mht Details


  • Category Exploit
  • Discovered 4/10/2010 7:17:21 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Medium
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f874a17a4b98d107de845c19d3a1cac6 3478  f874a17a4b98d107de845c19d3a1cac6 
7270cccee1912e6d6d60c5b8db5c38909423d46c.bin 66  750ef963dc3ed1d699a2a2486a60d9f1 
3cb1464756807b7ab8c12334db63763e.vir 2350  3cb1464756807b7ab8c12334db63763e 
cd7fd4bc19547570216fd62bed9feca9.vir 222  cd7fd4bc19547570216fd62bed9feca9 
ecb39ce4ecc74b81dd23b15fd7e737e4.vir 94  ecb39ce4ecc74b81dd23b15fd7e737e4 
954581381901cae45b50b865268a7e162121725d0b85517c26a1ea1f2186681d 1128  90b4d0c3a8c231854d26e1b5b13d00ee 
f25dc76ae128745ca4ab328e3e4cb66a.vir 1649  f25dc76ae128745ca4ab328e3e4cb66a 
5931c9c19b240d4e5d03d8cbadd85608.vir 116850  5931c9c19b240d4e5d03d8cbadd85608 
29fdf9fdff82fde0c7b617a8608c84fb 340  29fdf9fdff82fde0c7b617a8608c84fb 
6d18730cdff5d5168ad0fac3a42a766a4edd3b560e137d0f2c3a102ac2c04356 118  43b3fefe5012843260cdc658f9186e59 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware