Home / Spyware Encyclopedia / Worm.Brontok.ik << Back

Recommendation to Automatically remove Worm.Brontok.ik


Our products can remove Worm.Brontok.ik and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.ik Details


  • Category Worm
  • Discovered 8/26/2013 7:04:08 AM
  • Modified 10/3/2024 11:11:06 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
24c0591a3bde1831436cfc276dc7d7e1.exe 45336  24c0591a3bde1831436cfc276dc7d7e1 
c2bb413ee38d67a0f9ef6b38e46fb308.exe 42650  c2bb413ee38d67a0f9ef6b38e46fb308 
fe3f664008fa2ed4f97c9409ac004ebe.exe 42624  fe3f664008fa2ed4f97c9409ac004ebe 
c0482b12b722840300f854df264ec29f.exe 16075  c0482b12b722840300f854df264ec29f 
591acd68eb8ac78681e044b794e18da0669958f127b23d6bc256d4297be36109fc86176de7730ec0d2b79cf46362746f2e0.exe 42028  6ac3b250c488af20706d5880c6236b07 
b7cc3be1e478d57f73a1b156cdacf5fb.exe 45434  b7cc3be1e478d57f73a1b156cdacf5fb 
fc82ce53691c40b75db78cd5e6af9406b37c229e175f36e2befd8949d4ed50678c8153fc63c496b16db2d58660a4969622b.exe 65536  573e350cdf10c177cc3c690dddf1c025 
d42c679cb88160c6fd8d116f4f2299181ad80b9c2a834b1c3aa7d97f3e628a33492c8d63e10c6624f6d66e523854aa8b0ad.exe 18944  07337f9b8c9c48ebae0e21abbd228720 
656c8b0f94bb21d8c0ef4ecd8b422fa3.exe 45523  656c8b0f94bb21d8c0ef4ecd8b422fa3 
e4dcec223138e46fb74c81029ed28e33.exe 16384  e4dcec223138e46fb74c81029ed28e33 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware