Home / Spyware Encyclopedia / Worm.Brontok.am << Back

Recommendation to Automatically remove Worm.Brontok.am


Our products can remove Worm.Brontok.am and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.am Details


  • Category Worm
  • Discovered 10/25/2024 3:08:25 AM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
021f87759e35af884b49c1a1bb28cdc6.vxe.exe 58368 22.07.1987021f87759e35af884b49c1a1bb28cdc6 
134989f3e4046382f6e576adeb3dd0b8.exe 172032 22.07.1987134989f3e4046382f6e576adeb3dd0b8 
5bcf1fbb5c2adb196daab795c84e9e0355532c820a8b81aaec05a5552a55cf8c.exe 93704  569c9f0a1e6344088f13e7c111947405 
c1a689d9b3a4609faface6036db2ed74a8a40a49682e4c39162301f720ceecc4.exe 58368 22.07.19875746e1b62e49aaeb77c201960bf561b0 
7089e1da994dbe3422fa7d58900f1ca0.vir.exe 230912 22.07.19877089e1da994dbe3422fa7d58900f1ca0 
be0d89c03a5b18dd1ea13920349c37f89ebdd050486ab28114e7c6738aaf7395.exe 194905 22.07.1987b4c3be7842a3a9eb7cb1848e7a9f5d48 
3cb3e1f00f2274dbdae6797827d8fb4d.vir.exe 57344  3cb3e1f00f2274dbdae6797827d8fb4d 
196ae7727a5b2354f37f859c7729783b.vir.exe 200704 22.07.1987196ae7727a5b2354f37f859c7729783b 
24a454dd8ed45d226022ed6ae6824f89.vir.exe 93572  24a454dd8ed45d226022ed6ae6824f89 
bce3e0dae754f1e5e7d2c029f9a01aae.vir.exe 93665  bce3e0dae754f1e5e7d2c029f9a01aae 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware