Home / Spyware Encyclopedia / Flooder.CoreWarrior.a << Back

Recommendation to Automatically remove Flooder.CoreWarrior.a


Our products can remove Flooder.CoreWarrior.a and thousands of other Virus and Spyware automatically and instantly.

Flooder.CoreWarrior.a Details


  • Category Flooder
  • Discovered 10/24/2024 12:24:34 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A program that overloads a connection by any mechanism, such as fast pinging, causing a DoS attack. An E-Mail Flooder is a program used to send mass e-mail to flood or disrupt a PC or network.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c393e8f1cfe3b8f400a54c5e1b48caec.bin.exe 71680  c393e8f1cfe3b8f400a54c5e1b48caec13/03/2024
dd0b671587ce8db4250ac92215a8e91f8b3f811e.bin.exe 143360  ab520eb7b587ebb276e09069b3efdb5903/05/2024
420c9e4f219391f77043bacdf0cfbe2fdad0f3b039c57d01d525a6ede7f7b4b3.mrg.exe 159744  d744041de95f46ba470a1b4e4111f36d05/08/2024
124ac74f286916456854d3c3162bfca000cb302a2c662763c83deb1db95791e9.mrg.exe 159744  0d6b359e417260bba3ba75f2b24fdfd905/08/2024
032f2de59aef7e81bed2d9d464fb352760b3027c5fe66a0b373404881c907c7c.mrg.exe 159744  e1e640844cef8d6b09e086fd2bdcbe9605/08/2024
49406cdf02a8a2503f25f18ccfe2a7eac2e2f9bf096bb2d3655976d6981c2120.mrg.exe 159744  844aca595683ddcd9b36d5cd2807c4df05/08/2024
232bf0483dbbfbd0379894e35b48b9d620ccceebf1b5da6c1032dac0e52a0ef8.mrg.exe 159744  7b1d531453fb22a7a239ee011445c4bf05/08/2024
45e3cda98c9f15dce8f6923ea2de87da41250754b003d635e8576987fc36d315.mrg.exe 159744  2c7a921dcac3a47748cb0e6f58af6af506/08/2024
ab9659cf28fe47abf551ca595dbebd518711410d4cf255c096bf8a3b285d1c57.mrg.exe 159744  8caaac907caaf4f13c726eb72e5355eb06/08/2024
763750e95149270862e4950c6b23f90a29952eaea77cccfebdf2d0da272403ca.mrg.exe 159744  7805178785c7a5e7840e73b6571cc8e606/08/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware