Home / Spyware Encyclopedia / Worm.abuse.bj << Back

Recommendation to Automatically remove Worm.abuse.bj


Our products can remove Worm.abuse.bj and thousands of other Virus and Spyware automatically and instantly.

Worm.abuse.bj Details


  • Category Worm
  • Discovered 11/29/2012 7:37:57 AM
  • Modified 5/25/2023 3:10:54 PM
  • Threat Level Medium
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
eb894be8acc1b9cb55ebf2619ab047be.exe 98816  b9bcf6eb086be24e47222cea41759698 
15f1c543f8cf136866f52e95a161614a.exe 98816  15f1c543f8cf136866f52e95a161614a 
d72a63f8c16b030469fac502f4e60b1bb07f6995d067a67c0fccb60a7cf81445.exe 98816  08659d054c672138dc1bbca52dcc3a64 
f779f0ac561f1380538e0cd0a4a231dd1a21a666a359f30eb80d954adc3ddcd3.exe 99868  11126dd0f47777c2faf464bc5dc1ee3c 
757fb6f40a9ebffc63cbc96bb6d61223.htm.exe 98816  757fb6f40a9ebffc63cbc96bb6d61223 
b067b9966211d94b3aa0b2c7014a8e0677e0320f1cf2265ae8815ca3c024c0a0.exe 98816  c71d8f957d918b3a836885e5ff20774f 
5dc270ab2037b2c430fa80c0cd2d9569a419f907a7749a1c639f221373412c7d.exe 98816  7ef05a7ec73b572c603627430499ab8d 
2c413381f990c3b617456c346d168821.exe 98816  6afe457b384ff5f8f198d7f40275663d 
9ef8ef209b7da7550fe813608545f3d8c797da95cb3ffecf8b2998f196d2647d.exe 98816  ca054efd130863e36d249b5fe4a79f4c 
1ab4d93b5d3b34c570080dd25c01621f.exe 98816  cdbcc33741fb6a03e3de0a5211bcf20b 

The following Registry Entries were created:
..\System\CurrentControlSet\Enum\root\legacy_vrr\(Default)
..\System\CurrentControlSet\Services\vrr\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\krnl360svc.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\360rp.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\zhudongfangyu.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\dsmain.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\360sd.exe\(Default)
..\System\CurrentControlSet\Enum\root\legacy_drvkiller\(Default)
..\System\CurrentControlSet\Services\drvkiller\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\ravstub.exe\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware