Home / Spyware Encyclopedia / Worm.Abuse.ax << Back

Recommendation to Automatically remove Worm.Abuse.ax


Our products can remove Worm.Abuse.ax and thousands of other Virus and Spyware automatically and instantly.

Worm.Abuse.ax Details


  • Category Worm
  • Discovered 2/28/2023 8:04:44 AM
  • Modified 2/28/2023 5:46:24 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
67e262b2.exe 45804  c5ab5fd2ac762fd63d67ffe1e1c4927a 
aaff35384f43fd8774848872494455b334d25e3b575237d20b7e2c9dbffcb7b1315d14cb79a4269638ba316d2cba09f67bd.exe 266240  1e30a7a356ad434ba6d925248352350b 
68e6925b9ff3aacbd9ef5a0897626cb7.exe 281293  68e6925b9ff3aacbd9ef5a0897626cb7 
6d1818e83d7d689bfc21c01c0586aff4abfb32bb.bin.exe 65536  4047120b8ed4e52a075b21923ec4d313 
bf76287ad561271b810ddadeead3fc21d8f7baa2.bin.exe 139776  e43eddd398ea59baa89010779f8a2475 
f46139d5ab77de1b916b17629a0fbe2f32ceac8472feeef2958b5c2fd8b4ec5a.exe 78336  dbd6cab834b20fa0d9ea25f160bb2034 
fdc91ed838505af7b5699eb37ac27c03.vir.exe 65536  fdc91ed838505af7b5699eb37ac27c03 
e3b5d0cec11f1615f933b3b930a8bfee.vir.exe 104448  e3b5d0cec11f1615f933b3b930a8bfee 
18079c0279e046d957cf4586cd2ec075.exe 104448  18079c0279e046d957cf4586cd2ec075 
6d87302fb8e16b8303181ca0e3cb4b3b.vir.exe 707069  6d87302fb8e16b8303181ca0e3cb4b3b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware