Home / Spyware Encyclopedia / Exploit.DCom.w << Back

Recommendation to Automatically remove Exploit.DCom.w


Our products can remove Exploit.DCom.w and thousands of other Virus and Spyware automatically and instantly.

Exploit.DCom.w Details


  • Category Exploit
  • Discovered 9/24/2017 9:08:56 AM
  • Modified 3/5/2024 7:04:22 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d5049a893868a63ce9e676824956af28.exe 19456  d5049a893868a63ce9e676824956af28 
ddc90845e35603d02cf366c454605dca.vir.exe 32484  ddc90845e35603d02cf366c454605dca 
44bbb5adb0b7ad2fb48649fc86ea37fb.vir.exe 111872 1, 0, 1, 044bbb5adb0b7ad2fb48649fc86ea37fb 
ddc90845e35603d02cf366c454605dca.vir.exe 32484  ddc90845e35603d02cf366c454605dca09/08/2023
b8c865abeca0481b890be8e60ca07e9d.exe 23040  b8c865abeca0481b890be8e60ca07e9d05/03/2024
291bb717ba7eddc6f3760b0ea3ac725d.exe 936252Houssam1, 0, 1, 0291bb717ba7eddc6f3760b0ea3ac725d 
9dfa0dffd062645cc58a92b7f0f8a618.exe 32484  9dfa0dffd062645cc58a92b7f0f8a618 
e95f66974ca15682921ebc85aa760187.exe 32484  e95f66974ca15682921ebc85aa760187 
9c535e0485c9e3df9f23ea17ad60aacc.vxe.exe 1353171Kuwait1, 0, 1, 09c535e0485c9e3df9f23ea17ad60aacc 
virusshare_38e3490e15b6d4be8e15a4f592e67582.exe 44032  38e3490e15b6d4be8e15a4f592e6758209/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware