How to Remove “ar.exe”

6

Malware Entries

First Seen: 24 January 2009 at 8:30 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable e8efc1231b8c1828
ec7bb93726c4a844
6dabeef2
4eadec310c912568
7d283a347f425f20
TrojWare.Win
32.Agent.~v0
10
No 1.32.1060.
0
1.0.0.0 Internal Submission N/A
2 N/A Executable bc26e6d458fd8a75
56f35a36e3a4f079
db8de744
a2efb048e6619e40
cbdf50053e83727d
Unclassified
Malware
No N/A N/A Singapore N/A
3 N/A Executable e754442d4bfb6b9b
fdc296687fc701dc
da42ea60
3ff3981c3eac14fe
2e814144ec6f93cf
Unclassified
Malware
No N/A N/A Hungary N/A
4 N/A Executable 99b1e2f51206fe33
040293916ea29756
49ef8e29
05cf3987344ff7b6
047d78f01fe74c95
Virus.Win32.
Sality.gen
No N/A N/A Romania N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
30

Safe Entries

First Seen: 11 June 2008 at 7:51 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable 6488d49c7aabe03f
9a7189b0fb0ae496
b008d8d7
b282bb21de8265c1
12cf1a5fc30bf99a
No N/A N/A 10.224.1.57/32
2 N/A Executable 84f789a374d49177
228bbecd21b22289
4915dde5
271490e102c701f6
ed619f81e9f4c6bf
No N/A N/A United States
3 N/A Executable 02aaf73faa2b9a54
9e4f1a7625761170
0ca7d4d8
a20c006cdcb33b4a
7d196e64cac7c017
No N/A N/A 142.196.241.233/32
4 N/A Executable 7b476e70f977df11
6b85491eed602c9b
3eec2755
9bf3cdf59fdb3aa1
493b3a2eb54dbf06
No N/A N/A 198.20.167.84/32
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks