Exploit.

Short bio
Malwarebytes uses the detection name “Exploit” for a category of malware that uses known exploits to deliver their payloads. Exploits are known vulnerabilities in software that can be abused to gain some level of control over the systems running the affected software.
Type and source of infection
Exploits in general are not the malware payload, but a means to an end—their goal being to get the payload on the target system. Exploits are usually downloaded from the Internet or delivered as email attachments without the user’s knowledge.
Protection
Malwarebytes protects agains exploits by usinganti-exploit technology and real-time protection.
Remediation
Malwarebytes can detect and remove files detected as Exploit. without further user interaction.
- Pleasedownload Malwarebytes to your desktop.
- Double-clickMBSetup.exe and follow the prompts to install the program.
- When yourMalwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
- Click on theGet startedbutton.
- ClickScanto start aThreat Scan.
- ClickQuarantine to remove the found threats.
- Reboot the system if prompted to complete the removal process.




