Home / Spyware Encyclopedia / Flooder.CoreWarrior.a << Back

Recommendation to Automatically remove Flooder.CoreWarrior.a


Our products can remove Flooder.CoreWarrior.a and thousands of other Virus and Spyware automatically and instantly.

Flooder.CoreWarrior.a Details


  • Category Flooder
  • Discovered 10/24/2024 12:24:34 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A program that overloads a connection by any mechanism, such as fast pinging, causing a DoS attack. An E-Mail Flooder is a program used to send mass e-mail to flood or disrupt a PC or network.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a6d7e54acc625ff5fb3d40cb9d24e1f1.exe 139264  d86e2ed259795c76a7d92cf7031d69bc16/06/2020
3966dadba5c55a99b770727d6ab58950129271c618671bf487084364db41ca68.mrg.exe 159744  2be138f2d12e070f50af5a2168f2556e01/08/2024
6b85a829c9ff394146455830e9c4e0db19a6a1cd5337f8d785e8d451fe535f9f.mrg.exe 142336  9b45ec15440c838dbb66fce6bfb19db501/08/2024
a91c3ba75b3add666d4fd6b0030ab562b0e5ce29e189167cb5203c3676b9c2ca.mrg.exe 143360  93de9c954f4dc4c51287415a6d9bd65e01/08/2024
964e6319331bbadb0c29a795c79ddf8fa67cd9e3d4d2dd76915a4910481d4676.mrg.exe 159744  880ab9125dd51f400dfda9564de1a1fd05/08/2024
b258aad988c0bf669386e78d2796b03723246dec9feb6d3d1aa0cf5b58085759.mrg.exe 159744  8721ee9218cad6e997e0455eeecc9bb205/08/2024
112185861a57cd2034524febd48084fa044caa4bc3b236acb89a57565225ea5a.mrg.exe 159744  b5cdc48eaa3e487e44b294d6f7ac9fc706/08/2024
a4777cda2494220dc49ce31c348b9a92d8a0160b7a26afc835b4b386c766d4aa.mrg.exe 159744  a2fd51fa709a1c30da9c433749f64bad06/08/2024
0a45ac09eff4d19c7c2ee15decfadea3e4937a69efdaffa46041891f66b9e7b6.mrg.exe 159744  d528344db75d1bcb98d9231e40f712eb06/08/2024
5159f8111fdf742aabf9b090c2ed251aae0bc8b915dce24e1554642e60ff86ea.mrg.exe 159744  8623542b3782e4a994eb1366829e7a9306/08/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware