Home / Spyware Encyclopedia / Worm.Abuse.is << Back

Recommendation to Automatically remove Worm.Abuse.is


Our products can remove Worm.Abuse.is and thousands of other Virus and Spyware automatically and instantly.

Worm.Abuse.is Details


  • Category Worm
  • Discovered 3/14/2014 10:12:24 PM
  • Modified 3/1/2024 5:18:19 PM
  • Threat Level Low
  • Category Description
    A Worm is a malicious program that spreads itself without any user intervention. Worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network and also through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
568e3cc1a9bc3482b2cf8583be3dd77a.exe 50673  568e3cc1a9bc3482b2cf8583be3dd77a 
c3709b0168866e58d8111803a8141a5b.exe 53760  012aa6d4ef3337e99139397ffe1078fb 
308bcdd1860d577a403e7ce0f34b70143107c648.bin.exe 80896  453ee21c763f3bf671cc6a550501d616 
cd9968a17ed7d0aedce66404b13ad17f75296297835b2ba61f63d3058c7e12cf.exe 49664  b89c616785a3f4ac72e00254c1e870bf 
6512f9c1eeeafb24ee088650655038afba2bd933bb27754319c5811ad7256a03.exe 53760  13a61d5994193041599427abfd3004f0 
3b78ac4769e6a78fe50553623da5f700cf8a3706.bin.exe 259569  79b0eaefb7fee99468329cd6f8bab827 
757e7bfa56a2f86955f5ca6e92441518b07352f4.bin.exe 70656  71491dbef3a5ac024b3968d1b9401e80 
2c107ac451d0df451cd161195d6680de3959c889.bin.exe 81408  de8d8e2e22241ca56c7201afc6263930 
2effe5fe1437e2ca22c608bd908af5b1.exe 81408  2effe5fe1437e2ca22c608bd908af5b1 
a55d454e0d0c6abf836d60d878eadd9b77fa8f90.bin.exe 77312  52c11474909faf734e3320f72c11e477 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware