Home / Spyware Encyclopedia / Worm.Brontok.i << Back

Recommendation to Automatically remove Worm.Brontok.i


Our products can remove Worm.Brontok.i and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.i Details


  • Category Worm
  • Discovered 1/22/2013 4:30:15 PM
  • Modified 7/13/2023 4:54:00 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9d0179e75e737fd3ac11b8306334edfe1f6272bac9c577cdf775c0abb49db965.exe 48830  17fafcb271267cd325752f8f9058bc63 
08aaac1801c8250faf8d784396d53724fcf4f0a3d0ac613069fa75a6809750b1.exe 48830  1727e4f34be60618e12595611ded1fc9 
21a104adfdc36cca23cdc5d40a27fdc8.exe 48829  21a104adfdc36cca23cdc5d40a27fdc8 
2c608efb7eabb8d1c152d384b7dc5b7e.exe 48829  2c608efb7eabb8d1c152d384b7dc5b7e 
eff48f2c39126ec271324ab3f23305c07cbf6b275b28b573d574374f13b0c7b7.exe 48829  5261ad8c94a52ae0c7c7cd8560713da0 
8f6b29f900802af42f39a8f4e0e66464.exe 48828  8f6b29f900802af42f39a8f4e0e66464 
7a6704cf2551119a75cc9e6c1f7896415cf4bda2a08a3d819c7bc5fc6e4fa698.exe 48828  58c73fee982378f6f9174fc38535ed8b05/09/2020
23be0535fedba3d8e7dba511c31733a9.exe 48829  23be0535fedba3d8e7dba511c31733a9 
2ffdc7cf01d0bd47bfd63893eb2852961370763d.bin.exe 48830  050c2e67258829174a8d0dbc369e2bdf 
20d42c3cb4fc1ec0444f7e42ca272ae7.exe 48830  20d42c3cb4fc1ec0444f7e42ca272ae7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware