Home / Spyware Encyclopedia / Worm.Brontok.w << Back

Recommendation to Automatically remove Worm.Brontok.w


Our products can remove Worm.Brontok.w and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.w Details


  • Category Worm
  • Discovered 10/13/2024 4:54:39 PM
  • Modified 10/14/2024 11:33:30 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a06fd8fdb82bdb12407c20b6fe9cb86.vxe.exe 98304Doni'X GoOpenSource1.004a06fd8fdb82bdb12407c20b6fe9cb86 
0960b176bfb126fd7bd5659ac3d818b9.vxe.exe 93802 1.12.19850960b176bfb126fd7bd5659ac3d818b9 
111cdd549ad08c1e1578c28b7ae38c96.vxe.exe 93802 1.12.1985111cdd549ad08c1e1578c28b7ae38c96 
a0ac7aa887848c3cb97e312db4651ce5c11b110422ff19138ea5f81c029d1da4.exe 93802 1.12.1985103e1e53b41781a14696b90762c6faa0 
2158667a4215fca704c7a8d094d23c60.vxe.exe 93802 1.12.19852158667a4215fca704c7a8d094d23c60 
ed5abd542fe438575071206df76464b901ba590950da62d1aee733df80930b71.exe 46857 1.12.19856046d36e224d90f53c25d9500267b8e0 
210c180ed82bbb99c06d3810bf667a3a.vir.exe 184426 1.12.1985210c180ed82bbb99c06d3810bf667a3a 
58cf11e5a3c5fb9bb3d933fd409b3e3b.vir.exe 93802 1.12.198558cf11e5a3c5fb9bb3d933fd409b3e3b 
c14a26dfbf298be0dc1a1bd2cf667d6e.vir.exe 73728Police Document1.00c14a26dfbf298be0dc1a1bd2cf667d6e 
54980f21e415d97f0e2e793178395758.vir.exe 47016 1.12.198554980f21e415d97f0e2e793178395758 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware