Home / Spyware Encyclopedia / Worm.Autorun.icp << Back

Recommendation to Automatically remove Worm.Autorun.icp


Our products can remove Worm.Autorun.icp and thousands of other Virus and Spyware automatically and instantly.

Worm.Autorun.icp Details


  • Category Worm
  • Discovered 4/7/2024 2:26:08 PM
  • Modified 4/10/2024 10:51:00 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8d192b1fdc113de59357ad468284edcd.vir.exe 161280Avira GmbH7.6.0.598d192b1fdc113de59357ad468284edcd 
7dab3b7b6cbb2c97b09d6be33d167ddb.vir.exe 235520Avira GmbH7.6.0.597dab3b7b6cbb2c97b09d6be33d167ddb 
07a204abbf7e439494f2f82fce99420c.vir.exe 161280Avira GmbH7.6.0.59de5718955e8abe16aa7c5f527da509fa 
12fc45245ecbcc7505691fcc6c9f3a6e.vir.exe 243712Avira GmbH7.6.0.5912fc45245ecbcc7505691fcc6c9f3a6e 
199a3aaa6ab1f959329901040a05e5ec.vir.exe 109056  199a3aaa6ab1f959329901040a05e5ec 
2bb9af8f9f857b184683b8014285d36c.vir.exe 161280Avira GmbH7.6.0.592bb9af8f9f857b184683b8014285d36c 
6028ce5a2dfb0adfec640cd1cac7c06f.vir.exe 161280Avira GmbH7.6.0.590e1568ed9e9f280dcc9276e3838d9c52 
7fee157f2ed5be0b8015ad2758d2a51e.vir.exe 161280Avira GmbH7.6.0.597fee157f2ed5be0b8015ad2758d2a51e 
8a5c072e35f48781bc8598c994df6d87.vir.exe 246272Avira GmbH7.6.0.598a5c072e35f48781bc8598c994df6d87 
94f123b98a86547e4f0aa700831dfd6b.vir.exe 161792Avira GmbH7.6.0.5994f123b98a86547e4f0aa700831dfd6b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware