Home / Spyware Encyclopedia / Worm.Abuse.al << Back

Recommendation to Automatically remove Worm.Abuse.al


Our products can remove Worm.Abuse.al and thousands of other Virus and Spyware automatically and instantly.

Worm.Abuse.al Details


  • Category Worm
  • Discovered 5/24/2013 2:11:37 AM
  • Modified 7/25/2023 10:34:11 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
14854b676a2c65d310f062463c4735460424e7624e6649626c3034c255686a12.exe 118784  142a532a24a2fc18212d1e77d9c67e33 
6bbaaee28565b1e75fb98f3d8c032498.exe 978432  6bbaaee28565b1e75fb98f3d8c032498 
a8282a3e402e6508136b9017c54454d2.exe 103752  a8282a3e402e6508136b9017c54454d2 
893c39c4d7fed7cb7f65532d1e621660.vir.exe 98304  893c39c4d7fed7cb7f65532d1e621660 
347f90d0e2f1a63cd346ef380b09fe5a.vir.exe 46135  347f90d0e2f1a63cd346ef380b09fe5a 
1747070625427224720126e085c65335b8d275a10d25cdd7e73511ba9fe3071ab728666e231fa4f34297a836204a4.exe 46139  81c4de15106be6522ccf88375f6dc12f 
347f90d0e2f1a63cd346ef380b09fe5a.vir.exe 46135  347f90d0e2f1a63cd346ef380b09fe5a13/07/2023
4095ae28a08dc3ca7cc15cf6d5ca1b29.vir.exe 46139  4095ae28a08dc3ca7cc15cf6d5ca1b2913/07/2023
35f411b6051bce29f7f60735ca0c70e2.exe 40689  35f411b6051bce29f7f60735ca0c70e218/03/2021
e01aa1916632b7234242e0095c2d92db.vir.exe 114688  247d272ad476d184efb2abfdd724aa7b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware