Home / Spyware Encyclopedia / Worm.Brontok.c << Back

Recommendation to Automatically remove Worm.Brontok.c


Our products can remove Worm.Brontok.c and thousands of other Virus and Spyware automatically and instantly.

Worm.Brontok.c Details


  • Category Worm
  • Discovered 10/2/2024 1:13:48 PM
  • Modified 10/3/2024 11:11:33 AM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
email-worm.win32.brontok.c 81920  0a61e7ac8ee57a718919fc1406c57fb0 
27916ba2298c003dd1d0ae9daece4a9a32d2aca0.exe 253952  dd1718a041576446375ba210f757b8c6 
2ac10e73ba0fc1990c731cdd0f39aea8.exe 253952  2ac10e73ba0fc1990c731cdd0f39aea8 
e47221ca59d09d5c18fe935cdb3c165f.exe 102937  e47221ca59d09d5c18fe935cdb3c165f 
02a2173a3224ee5fc47b138dd137e421.exe 107008  02a2173a3224ee5fc47b138dd137e421 
bf485a6283b2a2c056d9dadfa92344d34a16b86ab1ee60d072f45e4af2741743.exe 107008  76a7eed3f89cc45c8c5d4bdecec16420 
2edb3d05d22283957938a53a95909e12fe145f8a94d0dac8bbef270eab2959ab3855cc5f0acc1f23cf317ef4641ea4a41ad.exe 274432  c3719e17f84aacd8ecf604e3a3546753 
c31c1b3462c2b30d364664697e3d8fa545178ff08960aa045aee167d57953de739674b9cabce611d624012b1a1ebb4a8f80.exe 266240  1d1bee69e60e1ca78e76a976be263b4d 
b29fe8b3d24bb445af4cfa2995e6d36d0160e27f28b04921e471db35a06ac634.exe 253952  025c4f272f863f016ca2e39b5565c860 
323de920a62ac9ab593adab250d3ed0c44d5bcd712f6b0ac7d38333aee196042.exe 81920 1.00.0004815049488cddc242946b4fee48443ca0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware