Home / Spyware Encyclopedia / Worm.abuse.bj << Back

Recommendation to Automatically remove Worm.abuse.bj


Our products can remove Worm.abuse.bj and thousands of other Virus and Spyware automatically and instantly.

Worm.abuse.bj Details


  • Category Worm
  • Discovered 11/29/2012 7:37:57 AM
  • Modified 5/25/2023 3:10:54 PM
  • Threat Level Medium
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a3dbf80655d4d38a6a15c4fefea23e22.ht.exe 98816  a3dbf80655d4d38a6a15c4fefea23e22 
d72a63f8c16b030469fac502f4e60b1bb07f6995d067a67c0fccb60a7cf81445.exe 98816  08659d054c672138dc1bbca52dcc3a64 
757fb6f40a9ebffc63cbc96bb6d61223.htm.exe 98816  757fb6f40a9ebffc63cbc96bb6d61223 
fd9d7e2ceb0d3ad2c7bd54176feecbd7.exe 98816  6c8dd0a612c034d5b99c88764e8fd8b1 
9ef8ef209b7da7550fe813608545f3d8c797da95cb3ffecf8b2998f196d2647d.exe 98816  ca054efd130863e36d249b5fe4a79f4c 
87b139aa24b2c2589a886bee357ad48c.exe 1036288  87b139aa24b2c2589a886bee357ad48c 
ae3d5c43bd8c16ce03f04517a19d8354a488581d13791d147a13e3911b6e97a6.exe 98816  6f98b91bb709491fb7dfbc46f610dc91 
4457cd14364cb603332a0d1315444bec.exe 98816  df93e50539a68c1424b2db6aec131b5b 
42ccde848b10250284db970af17be6b5.exe 98816  bfafb0476ec4bf5a60123dbc28b3e8d4 
133075489ccd8d0886543859faae178d5de491dd.bin.exe 98814  bb72a20fa37b5aa94c4cc46e82c9ff5b 

The following Registry Entries were created:
..\System\CurrentControlSet\Enum\root\legacy_vrr\(Default)
..\System\CurrentControlSet\Services\vrr\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\krnl360svc.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\360rp.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\zhudongfangyu.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\dsmain.exe\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\360sd.exe\(Default)
..\System\CurrentControlSet\Enum\root\legacy_drvkiller\(Default)
..\System\CurrentControlSet\Services\drvkiller\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\image file execution options\ravstub.exe\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware