Home / Spyware Encyclopedia / Worm.Brontok.i << Back

Recommendation to Automatically remove Worm.Brontok.i


Our products can remove Worm.Brontok.i and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.i Details


  • Category Worm
  • Discovered 1/22/2013 4:30:15 PM
  • Modified 7/13/2023 4:54:00 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3c59f266.exe 48830  300a19781e19f9814d9be840f794c2d7 
7a6704cf2551119a75cc9e6c1f7896415cf4bda2a08a3d819c7bc5fc6e4fa698.exe 48828  58c73fee982378f6f9174fc38535ed8b 
9d0179e75e737fd3ac11b8306334edfe1f6272bac9c577cdf775c0abb49db965.exe 48830  17fafcb271267cd325752f8f9058bc63 
08aaac1801c8250faf8d784396d53724fcf4f0a3d0ac613069fa75a6809750b1.exe 48830  1727e4f34be60618e12595611ded1fc9 
196a091975414a15be439d53da925666c8d5d4687caa4898b97a0d145e1e100f.exe 48830  13f9e89d32f40952931eb8171d6f0e36 
c27faf05ae282577c184349bb5dd01bc.exe 48829  c27faf05ae282577c184349bb5dd01bc 
24780b12c8653c4867e84a7f5807fe19.exe 48828  24780b12c8653c4867e84a7f5807fe19 
bf72fc32974c5e400a346f35c0bdf351c43edfc3d74ee98fb188dc33db522ce8.exe 48829  2448681dbdd0a071331e36c908a31df9 
2c608efb7eabb8d1c152d384b7dc5b7e.exe 48829  2c608efb7eabb8d1c152d384b7dc5b7e 
21a104adfdc36cca23cdc5d40a27fdc8.exe 48829  21a104adfdc36cca23cdc5d40a27fdc8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware