Home / Spyware Encyclopedia / Rootkit.HideProc.bj << Back

Recommendation to Automatically remove Rootkit.HideProc.bj


Our products can remove Rootkit.HideProc.bj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HideProc.bj Details


  • Category Rootkit
  • Discovered 4/14/2017 4:54:07 AM
  • Modified 2/21/2024 12:44:33 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e81d69326101d93786537b20a86d5b33.sys 13688<company name here>1.0.0.0e81d69326101d93786537b20a86d5b33 
f023d2981e060e5d535e2e32eeb10ce3.dll 913408 1.0.0.0f023d2981e060e5d535e2e32eeb10ce3 
d5279e0806f89193a6440ceefc0a5414b5f89929e8eb5450d0e9bc534f1b1dfbf2a696e3f7cb40a1608ce1af30bfbc68193.exe 575600  03e75fda301fba86c8c073d04e26de55 
47cd6e95a9d39cdff4d4ade13146238b.exe 1204224 1.0.0.047cd6e95a9d39cdff4d4ade13146238b 
011a1b477fa031504db723bb54a0c40c.exe 558080  011a1b477fa031504db723bb54a0c40c 
f7938727b44904efce490fb11ba80472.exe 759808  f7938727b44904efce490fb11ba80472 
fecf49d3f2156d0a61446fea99d8d29f81adee7d910d14cbb2b547b1b8c4a303.exe 1932288Jnc Sir1.3.0.081edd900a16984415a5e5907d7367b91 
blgcio.dll 102400  319116a92754a95fb08bf49f729bf7bb 
55c6a1df24347cbc3c969660342582f8.sys 23857<company name here>1.0.0.055c6a1df24347cbc3c969660342582f8 
dc2074e23e197401cf24dd8ca73dca99fe2804a71331a8cfa00a3fc6310c8e29.sys 11246<company name here>1.0.0.04ce5462751b8d16c23518d6c499f703e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware