Home / Spyware Encyclopedia / Flooder.CoreWarrior.a << Back

Recommendation to Automatically remove Flooder.CoreWarrior.a


Our products can remove Flooder.CoreWarrior.a and thousands of other Virus and Spyware automatically and instantly.

Flooder.CoreWarrior.a Details


  • Category Flooder
  • Discovered 10/24/2024 12:24:34 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A program that overloads a connection by any mechanism, such as fast pinging, causing a DoS attack. An E-Mail Flooder is a program used to send mass e-mail to flood or disrupt a PC or network.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fe3045d4ffef04477ce2d3479d4c41421700bbf402dfde61fcd7aacc58d45d15.mrg.exe 159744  7ba8f526fa46f03260af22b3dda7dc2f05/08/2024
096a5e63440da2382d2603117c3a931db0c352c90fba74fd45219faad9373ae8.mrg.exe 159744  0b0ebc5b55f1345593962175d1a903ec06/08/2024
2004a8aa0dea6060f26eb80e8b347cc3189998f489e69fe39ec8cbc351c9abe0.mrg.exe 159744  8cf51065529c8f68e02323e12b75fec206/08/2024
c6a8285349eec8184113190a324ec68dd9d2809010e4a8ed565ac1cf69495ad1.mrg.exe 159744  e792028a9129072e9a725d7d1c69f3ea06/08/2024
5159f8111fdf742aabf9b090c2ed251aae0bc8b915dce24e1554642e60ff86ea.mrg.exe 159744  8623542b3782e4a994eb1366829e7a9306/08/2024
942613bd3b795a9b04c00b4677d2f19ce0436d4d6cfdd0ce520f194292494cc0.mrg.exe 159744  74a2887b316afd62be0a823dd429021406/08/2024
febd4d983b75b9785fddbb410e1df5fd08a4fb5d8c8cd931ce376b9dc9f511c8.mrg.exe 159744  6a4ab2152d4dd821b359c1e44556670506/08/2024
8fa693e002efbfda3b13e39d1afa250f70deb8c3a9b1a7b80bb4dc23808a0490.mrg.exe 159744  7d947b46f492128a5a60490c4d23c60d06/08/2024
f7780f77abe502c98d540b532d2037237df58f8851804c663d35197cb83e6b02.mrg.exe 159744  e577c5aefcc4d0c2cc34e059e5c58aff06/08/2024
5002e335e1faba13de387993724d480357d51d084c498d0a8459a8e106297536.mrg.exe 159744  5b9ac23dd17a11a1b989813fd0fa678e06/08/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware