Home / Spyware Encyclopedia / Backdoor.Plite.bhuj << Back

Recommendation to Automatically remove Backdoor.Plite.bhuj


Our products can remove Backdoor.Plite.bhuj and thousands of other Virus and Spyware automatically and instantly.

Backdoor.Plite.bhuj Details


  • Category Backdoor
  • Discovered 10/23/2024 10:24:24 AM
  • Modified 10/23/2024 12:14:19 PM
  • Threat Level Low
  • Category Description
    A Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user's knowledge. A Backdoor compromises system integrity by making changes to the system that allow it to be used by the attacker for malicious purposes unknown to the user.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
81c06e0ee0d84245c38f97596f5b6e58.exe 121874  81c06e0ee0d84245c38f97596f5b6e58 
c3380e1feb29bba3eee033476ea65820.vir.exe 128604  c3380e1feb29bba3eee033476ea6582005/02/2020
1031-869165024d23b609f530e97c99d76cb0e18b85a0.exe 53966  2e4ec7970ed43437e3d9b0876affdb8020/01/2022
002d313020529b4d4d4247c11f50e3d1.exe 54292  002d313020529b4d4d4247c11f50e3d129/01/2022
e8da7854de3ef94cde3f5cc895b7db1b1c251ba4fc0049d1942ebdc4a2c997f1.mrg.exe 54357  9ce0b3e99cd97dcf96252fbd655f255003/02/2022
dc4eaf0add2a966d0cab23f036ab286d4e8b6b08b23fab99050ffadc09c2b703.mrg.exe 54331  50c3da99ac6f651ba067dfa790c598bb03/02/2022
c073bd4fd436ceabf393bbf0160e610aa002a88f8360689932df30f7f6187dff.mrg.exe 53991  5b8c469f5ec559920ecf4bb59756615308/02/2022
3c15d569c27dac1d2db6acb27ff438d52c2c9908b1a819aa0a47f0cf06e1c020.mrg.exe 54304  4748997af4889ecdefb21a7a1f42257512/02/2022
1059-0ad41d769a8f8379e75d7f0d7065cdc8dd0c228f.exe 53934  120cc745f48996c4589b05f831f5c34116/02/2022
f8b543cf2c1692a3088c5e3929ccab08b43259378f67adcabfa95793eb4d1a8b.mrg.exe 53768  96f21b72eff2d53f39f0ff7722e3db1217/02/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware