Home / Spyware Encyclopedia / Worm.Bobic.d << Back

Recommendation to Automatically remove Worm.Bobic.d


Our products can remove Worm.Bobic.d and thousands of other Virus and Spyware automatically and instantly.

Worm.Bobic.d Details


  • Category Worm
  • Discovered 7/15/2017 12:04:10 AM
  • Modified 8/9/2023 3:19:11 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a848986211a97188f55f87e2a3e77a9d.exe 36555  a848986211a97188f55f87e2a3e77a9d 
virusshare_c714705783c5c7dcc51c37952fe317cb.exe 5853184  c714705783c5c7dcc51c37952fe317cb09/08/2023
net-worm.win32.bobic.d-9c2df8a86be30f32195461e48f192f865e26421071140c1d0bb89f8d3956a0a3.exe 32256  c06b52dfee0fef654c61516452d51d6604/08/2023
net-worm.win32.bobic.d-1c8e9791a65a546bd2545eeb6dd67f202bf82f17ad894a2d9815312d1b61c7e2.exe 33280  8f4c8ff06d8eae9837f4d63cb28a489b04/08/2023
a848986211a97188f55f87e2a3e77a9d.exe 36555  a848986211a97188f55f87e2a3e77a9d13/01/2021
bbeda12d4945c475b1ac1f5154ee3201.exe 32256  bbeda12d4945c475b1ac1f5154ee320117/06/2020
f36c610c158759bd97c87f4c97633120.vir.exe 33364  f36c610c158759bd97c87f4c97633120 
107203ad84a736de14cd93464447ec33.vir.exe 32256  107203ad84a736de14cd93464447ec33 
952f1c1b9d81720db46cab6e9ce354b7.vir.exe 32768  952f1c1b9d81720db46cab6e9ce354b7 
a8282be0b48a0d497feaaebe2aad06f3.vir.exe 38091  a8282be0b48a0d497feaaebe2aad06f3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware