Home / Spyware Encyclopedia / Rootkit.HideProc.al << Back

Recommendation to Automatically remove Rootkit.HideProc.al


Our products can remove Rootkit.HideProc.al and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HideProc.al Details


  • Category Rootkit
  • Discovered 5/3/2011 9:19:57 AM
  • Modified 8/9/2023 3:11:15 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
65bfb0a260db3c9e195124cdf947fe8b.sys 325909  65bfb0a260db3c9e195124cdf947fe8b 
6722cce89f65e9f2df4f0bcd34fa4ef21ea9ed69.bin.sys 8437  123b19bbee9af18ae82cff4fea0ff385 
173209078205f818deabdcc11cab1e642c9cb0bb6d659421f35e1329f7731027eae5c1141d19e73465ca5788f56f0.sys 17988  45e9bd532c8fcc0b1b27be8920db8891 
6722cce89f65e9f2df4f0bcd34fa4ef21ea9ed69.bin.sys 8437  123b19bbee9af18ae82cff4fea0ff38516/09/2022
virusshare_5eb70213ae054951d378bbbf7afd36a3.sys 18295  5eb70213ae054951d378bbbf7afd36a330/07/2023
A608AE1A2AC561FD95A41F9B0213009A311863DD.{OVL}{PE} 0  d5b5e5e3bff4ef23ed2d7a548e77493709/08/2023
1BF68A47A05AB10B21458E1631C79BD5C3F82E43.{OVL}{PE} 0  5221ede7eb97de1cd484b5514268b0d226/07/2023
3BBC640FE27BBB64F19F66C3FE42E5369F01EA48.{OVL}{PE} 0  7a1a4ecf032fe0a51eeef8b7da0df2f113/06/2023
65b5cfed45c543f66d54b4aea8a6eac7.vir.sys 17988  65b5cfed45c543f66d54b4aea8a6eac719/04/2023
141626b07e0b603bedd545eb924fff26a6f0ee17.bin.exe 51429  00fb9117c55e169ec8a9eb00c0de974c12/04/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware