Home / Spyware Encyclopedia / Exploit.IMG-WMF.lr << Back

Recommendation to Automatically remove Exploit.IMG-WMF.lr


Our products can remove Exploit.IMG-WMF.lr and thousands of other Virus and Spyware automatically and instantly.

Exploit.IMG-WMF.lr Details


  • Category Exploit
  • Discovered 1/28/2012 8:55:00 PM
  • Modified 5/10/2022 2:53:58 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
exploit.win32.img-wmf.lr 15360Microsoft Corporation5.1.2600.5512bf970dc3acacfb418d62a83f10beb9a0 
699b5d62ab7a8a7d6206f3b20d23c3a1.vXE.exe 13312Microsoft Corporation5.1.2600.5512 (xpsp699b5d62ab7a8a7d6206f3b20d23c3a1 
4a36858633cea14e36f962db6cb6a889.vXE.exe 42832Microsoft Corporation5.1.2600.5512 (xpsp4a36858633cea14e36f962db6cb6a88921/07/2023
107f6dbf4db5b7074b0c5e3891b70e46d96f4475dc402701301f4af59951f827c1e0bc5ac1f486e58b6d8fa46a40ccc3437.exe 11776Microsoft Corporation5.1.2600.5512 (xpsped3cfd76d7ad79d043b65cf26f7861dd10/05/2022
107f6dbf4db5b7074b0c5e3891b70e46d96f4475dc402701301f4af59951f827c1e0bc5ac1f486e58b6d8fa46a40ccc3437.exe 11776Microsoft Corporation5.1.2600.5512 (xpsped3cfd76d7ad79d043b65cf26f7861dd 
ffdaeef5.exe 15360Microsoft Corporation5.1.2600.55122d58832a6dd8962702cda7ea44b42206 
3078a6e1.exe 15360Microsoft Corporation5.1.2600.55123230106bd114c17b2ee77133d37d2ddf 
6f5a68e0ea5479864636073724ee5934915d2d9616758bcc5962b595ad986b6b.exe 18256Microsoft Corporation5.1.2600.5512 (xpspd9df88ad6e28504c8165a69e8938864a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware