Home / Spyware Encyclopedia / Exploit.Mht << Back

Recommendation to Automatically remove Exploit.Mht


Our products can remove Exploit.Mht and thousands of other Virus and Spyware automatically and instantly.

Exploit.Mht Details


  • Category Exploit
  • Discovered 4/10/2010 7:17:21 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Medium
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
EE363532.EXE 191  afb82235ac19dcb1af61711d374e3d51 
77523449ab949a252daa95c5ef0604b7 959  77523449ab949a252daa95c5ef0604b7 
3e0666b1304377bb4951ff8d22acc1aa 13265  3e0666b1304377bb4951ff8d22acc1aa 
8eadf95115d62deff01629dbce840deb 15259  8eadf95115d62deff01629dbce840deb 
35ae2c9ae65143f73e6ee3686ae666dc 26816  35ae2c9ae65143f73e6ee3686ae666dc 
8f426376bd1e250e9886bbc216b45371 15259  8f426376bd1e250e9886bbc216b45371 
a4d536beeff526ef3eccb5ba638b1ebe.dat 6089  a4d536beeff526ef3eccb5ba638b1ebe 
d01706789071934de7815fcefeb9f0c8359bb704c8457d47125a188ac8c3aa7c.htm 19036  ec23043bcd79036864a91fef28c41cca 
ceb7cfa82180d629e2ae25614218f926 72  ceb7cfa82180d629e2ae25614218f926 
6d18730cdff5d5168ad0fac3a42a766a4edd3b560e137d0f2c3a102ac2c04356 118  43b3fefe5012843260cdc658f9186e59 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware