Home / Spyware Encyclopedia / Exploit.DCom.a << Back

Recommendation to Automatically remove Exploit.DCom.a


Our products can remove Exploit.DCom.a and thousands of other Virus and Spyware automatically and instantly.

Exploit.DCom.a Details


  • Category Exploit
  • Discovered 3/28/2011 2:29:46 PM
  • Modified 8/9/2023 3:11:11 PM
  • Threat Level Low
  • Category Description
    Exploits use vulnerabilities in operating systems and applications to achieve the same result. Or in other words, this is a type of malware containing a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software. This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e9bc9180f05094b543b24a7395eea3a1.exe 36864  e9bc9180f05094b543b24a7395eea3a125/06/2020
41c3881041a202b3bc25d7f24b0ae99ca7cf1d53a8271a8ecab0e3d472931ae6.exe 38912  b49331bdfa9185620b4e56d9e1f4b2ee09/08/2023
6134487e5c56920fc232fd65c885a4cf.exe 40960  6134487e5c56920fc232fd65c885a4cf06/12/2022
c844492f694b76def60cebee8360f790.vir.exe 30208  c844492f694b76def60cebee8360f79012/05/2022
c3a830374030373b45bf4ac08be99bdf.vir.exe 28672  c3a830374030373b45bf4ac08be99bdf 
c8ae6a5a64f01d263b10b5865698f436.vir.exe 45056  c8ae6a5a64f01d263b10b5865698f436 
9168a60c9b0a7f7c7e8815de2b3964cf.vir 3361  9168a60c9b0a7f7c7e8815de2b3964cf 
e9bc9180f05094b543b24a7395eea3a1.exe 36864  e9bc9180f05094b543b24a7395eea3a1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware