Home / Spyware Encyclopedia / Exploit.DCom.x << Back

Recommendation to Automatically remove Exploit.DCom.x


Our products can remove Exploit.DCom.x and thousands of other Virus and Spyware automatically and instantly.

Exploit.DCom.x Details


  • Category Exploit
  • Discovered 1/22/2010 10:09:20 AM
  • Modified 8/14/2023 3:12:09 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
exploit.win32.dcom.x 714752dcc.darksideofkalez.com1.0.0.08c279f69600276fb49bd015e6d2f0478 
3e28d3a59a91c29d24fd5e54882d5f6c.vxe.exe 716800dcc.darksideofkalez.com1.003e28d3a59a91c29d24fd5e54882d5f6c 
23ace5771b5cc1e560567f0a6c33dad6.exe 709632dcc.darksideofkalez.com1.0023ace5771b5cc1e560567f0a6c33dad6 
998c19e1d94ba563a515d30c80daad6a.vxe.exe 691476  998c19e1d94ba563a515d30c80daad6a 
d3eb22974448b7af8ee5309501335c4f.exe 830440dcc.darksideofkalez.com1.00d3eb22974448b7af8ee5309501335c4f 
8b44855f87cf0efcec3ea3d2478aab869d7d84f2.bin.exe 714752dcc.darksideofkalez.com1.009b46643fc8610079d3b7f6aa4849e359 
4fd7c5f523832210e780b3c3fc67ade5.vxe.exe 714752dcc.darksideofkalez.com1.004fd7c5f523832210e780b3c3fc67ade5 
130450092153322ccf956cae4159dc8b5c48f865e8865c3b300b2b1c838d151f8f0cf9773879724f2430a9fd5e5e9.exe 636336dcc.darksideofkalez.com1.0017ba335ff05eb82b1684142171032230 
54608da433447ede0c80a1521e1b4657.vxe.exe 714480dcc.darksideofkalez.com1.0054608da433447ede0c80a1521e1b4657 
27e20a55c00e30ba10b08e37be567fbf.exe 32768  27e20a55c00e30ba10b08e37be567fbf 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware