Home / Spyware Encyclopedia / Flooder.CoreWarrior.a << Back

Recommendation to Automatically remove Flooder.CoreWarrior.a


Our products can remove Flooder.CoreWarrior.a and thousands of other Virus and Spyware automatically and instantly.

Flooder.CoreWarrior.a Details


  • Category Flooder
  • Discovered 10/24/2024 12:24:34 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A program that overloads a connection by any mechanism, such as fast pinging, causing a DoS attack. An E-Mail Flooder is a program used to send mass e-mail to flood or disrupt a PC or network.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
58bb17aee6aa2772e29bbcef9ca99174.exe 139539  58bb17aee6aa2772e29bbcef9ca9917425/05/2021
04ca8654a77ef51248b63f7e10e45e99.bin.exe 159744  04ca8654a77ef51248b63f7e10e45e9908/04/2024
dd0b671587ce8db4250ac92215a8e91f8b3f811e.bin.exe 143360  ab520eb7b587ebb276e09069b3efdb5903/05/2024
fe3045d4ffef04477ce2d3479d4c41421700bbf402dfde61fcd7aacc58d45d15.mrg.exe 159744  7ba8f526fa46f03260af22b3dda7dc2f05/08/2024
0728b197d38c4519ce98e942e4f9680b37ae1c628057a3023fa77db25d04b641.mrg.exe 159744  ea09dc1821cc9e00a3a272832930446a06/08/2024
126e7aa5c1122a164777af089441cd6f544078bb35cfcd2158363a56b7e8f180.mrg.exe 159744  19d53928142cf95f7716a4297f046bcf06/08/2024
05a82efb826f3c515e642b82a0b01c103fae422e020beb6cdb3659606c9ae433.mrg.exe 159744  b0b1017150e2e02accc2fb644acc9bd506/08/2024
096a5e63440da2382d2603117c3a931db0c352c90fba74fd45219faad9373ae8.mrg.exe 159744  0b0ebc5b55f1345593962175d1a903ec06/08/2024
2004a8aa0dea6060f26eb80e8b347cc3189998f489e69fe39ec8cbc351c9abe0.mrg.exe 159744  8cf51065529c8f68e02323e12b75fec206/08/2024
53ad4c5bc1a2d1f15848ddd3dcd2d73fd393a1802e35aeff6683e79dea4a663b.mrg.exe 159744  b52e84d4a2c0bbe4255e09576b72fca106/08/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware