Home / Spyware Encyclopedia / Rootkit.HideProc.bj << Back

Recommendation to Automatically remove Rootkit.HideProc.bj


Our products can remove Rootkit.HideProc.bj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HideProc.bj Details


  • Category Rootkit
  • Discovered 4/14/2017 4:54:07 AM
  • Modified 2/21/2024 12:44:33 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e81d69326101d93786537b20a86d5b33.sys 13688<company name here>1.0.0.0e81d69326101d93786537b20a86d5b33 
1e9dac22ca5bd9ac635628fc5698d87b.exe 723913  1e9dac22ca5bd9ac635628fc5698d87b 
e5c874669490af3641e8c6af736219c0.sys 174196<company name here>1.0.0.0e5c874669490af3641e8c6af736219c0 
f023d2981e060e5d535e2e32eeb10ce3.dll 913408 1.0.0.0f023d2981e060e5d535e2e32eeb10ce3 
0904acee61a82481e3f9240a22ff476eee9aa7620ae2fca02aa57b0c78bbe4202d09f525a7f67c48a4b558051e25244e06c.sys 295973<company name here>1.0.0.045fe23b065d306b0abe2eee51974df90 
47cd6e95a9d39cdff4d4ade13146238b.exe 1204224 1.0.0.047cd6e95a9d39cdff4d4ade13146238b 
011a1b477fa031504db723bb54a0c40c.exe 558080  011a1b477fa031504db723bb54a0c40c 
f7938727b44904efce490fb11ba80472.exe 759808  f7938727b44904efce490fb11ba80472 
fc1f3fd460cd26498f10b2a88ea1a4eb.exe 760320  fc1f3fd460cd26498f10b2a88ea1a4eb 
19574006406198083e946831ed14d34aa54bb93c0c82f4c6c8a1259d9cc395bffa27eb7cf5dccff85130f233bc6eb.exe 2097152寒雪1.0.0.0260c7c8ac62d53d08c00bcdafd34b7c8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware