Home / Spyware Encyclopedia / Exploit.DCom.w << Back

Recommendation to Automatically remove Exploit.DCom.w


Our products can remove Exploit.DCom.w and thousands of other Virus and Spyware automatically and instantly.

Exploit.DCom.w Details


  • Category Exploit
  • Discovered 9/24/2017 9:08:56 AM
  • Modified 3/5/2024 7:04:22 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9dfa0dffd062645cc58a92b7f0f8a618.exe 32484  9dfa0dffd062645cc58a92b7f0f8a618 
ddc90845e35603d02cf366c454605dca.vir.exe 32484  ddc90845e35603d02cf366c454605dca09/08/2023
virusshare_38e3490e15b6d4be8e15a4f592e67582.exe 44032  38e3490e15b6d4be8e15a4f592e6758209/08/2023
291bb717ba7eddc6f3760b0ea3ac725d.exe 936252Houssam1, 0, 1, 0291bb717ba7eddc6f3760b0ea3ac725d 
e95f66974ca15682921ebc85aa760187.exe 32484  e95f66974ca15682921ebc85aa760187 
d5049a893868a63ce9e676824956af28.exe 19456  d5049a893868a63ce9e676824956af28 
9c535e0485c9e3df9f23ea17ad60aacc.vxe.exe 1353171Kuwait1, 0, 1, 09c535e0485c9e3df9f23ea17ad60aacc 
b8c865abeca0481b890be8e60ca07e9d.exe 23040  b8c865abeca0481b890be8e60ca07e9d05/03/2024
e3d95d6505179cd40bbb76d6fca6352434c6361eaeb5884e1809f3bf3b202b01.exe 43786  9104a33be833fcec149155662252438003/08/2023
7d8ebdd2b0efcd62e34340e67ad666d7.vir.exe 34304  7d8ebdd2b0efcd62e34340e67ad666d720/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware