Home / Spyware Encyclopedia / Worm.Bacteraloh.e << Back

Recommendation to Automatically remove Worm.Bacteraloh.e


Our products can remove Worm.Bacteraloh.e and thousands of other Virus and Spyware automatically and instantly.

Worm.Bacteraloh.e Details


  • Category Worm
  • Discovered 6/17/2011 8:11:31 PM
  • Modified 8/9/2023 3:13:05 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
04f8b540729fb0fa04f6672d9606831a.exe 309760  04f8b540729fb0fa04f6672d9606831a 
e09e273f8c0d66123615546604ec6d7c.vxe.exe 274432 1.00e09e273f8c0d66123615546604ec6d7c 
582ec4c57476e4b9ba842e45d37df71c.exe 309760  582ec4c57476e4b9ba842e45d37df71c 
037f4c410da62f9e3f942fc322e1fa59fa8027a4cf8a3a16391e552aa9b9bd7c.exe 309760  70d24c66fbc166f97e773ba28e6377f5 
6213344b7fe94197278ae570f2138411.exe 309760  6213344b7fe94197278ae570f2138411 
609e8b75918c744c8ccb58bde8165c10.vir.exe 309760  609e8b75918c744c8ccb58bde8165c10 
4d0e29a2c919d1efe511a74aff250f17810dac34915f8dc8b8835477d7ad273a.exe 274432 1.0052cb315b25701f2d957964fbd88039c1 
c2b0768ed153fc25f0467906af90f48a3826da8ef8dfe889c789f00573592d01.exe 309760  9d73115ddb7435dab0f298c998adf59a 
569f381f9f240cc134613e82efd2d27818b8feb4af5fcaca7d2a5cc254ae59ad.exe 309760  5edfb2c6b25d6f38c343f221674fb229 
cc4120a1dff0a4ffa25ff647400878fe6aabae41dd7de97bdbf8f52b1447959d.exe 309760  dc2b37cb0005e25f9320601581de62a1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware