Home / Spyware Encyclopedia / Exploit.DCom.w << Back

Recommendation to Automatically remove Exploit.DCom.w


Our products can remove Exploit.DCom.w and thousands of other Virus and Spyware automatically and instantly.

Exploit.DCom.w Details


  • Category Exploit
  • Discovered 9/24/2017 9:08:56 AM
  • Modified 3/5/2024 7:04:22 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9c535e0485c9e3df9f23ea17ad60aacc.vxe.exe 1353171Kuwait1, 0, 1, 09c535e0485c9e3df9f23ea17ad60aacc 
d5049a893868a63ce9e676824956af28.exe 19456  d5049a893868a63ce9e676824956af28 
e95f66974ca15682921ebc85aa760187.exe 32484  e95f66974ca15682921ebc85aa760187 
9dfa0dffd062645cc58a92b7f0f8a618.exe 32484  9dfa0dffd062645cc58a92b7f0f8a618 
291bb717ba7eddc6f3760b0ea3ac725d.exe 936252Houssam1, 0, 1, 0291bb717ba7eddc6f3760b0ea3ac725d 
0a05eb98c9c027124bf288ffdb960a203001db99bc90512d0120d5bbc6076dad.exe 936252Houssam1, 0, 1, 0291bb717ba7eddc6f3760b0ea3ac725d 
7d8ebdd2b0efcd62e34340e67ad666d7.vir.exe 34304  7d8ebdd2b0efcd62e34340e67ad666d7 
ddc90845e35603d02cf366c454605dca.vir.exe 32484  ddc90845e35603d02cf366c454605dca 
44bbb5adb0b7ad2fb48649fc86ea37fb.vir.exe 111872 1, 0, 1, 044bbb5adb0b7ad2fb48649fc86ea37fb 
57139241dd878670308e20919e882ffb.vir.exe 921887QHT1, 0, 1, 057139241dd878670308e20919e882ffb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware