{"id":11869,"date":"2012-03-16T07:07:33","date_gmt":"2012-03-16T03:07:33","guid":{"rendered":"http:\/\/greatis.com\/blog\/how-to-remove-malware\/_ex-68-exe-2.htm"},"modified":"2012-03-16T07:07:33","modified_gmt":"2012-03-16T03:07:33","slug":"_ex-68-exe-2","status":"publish","type":"post","link":"https:\/\/greatis.com\/blog\/rootkit\/_ex-68-exe-2.htm","title":{"rendered":"_EX-68.EXE is Rootkit MalOb-JI"},"content":{"rendered":"<div class=\"wpInsert wpInsertInPostMy wpInsertAbove\" style=\"padding: 0px;\"><\/div><p class=\"sign\">Rootkit <b>_EX-68.EXE<\/b> is software that enables continued privileged access to a computer while actively hiding its presence.<br \/>\nDetection and removal of <b>_EX-68.EXE<\/b> may be a very difficult process.<br \/>\nYou should  use anti-rootkit software to fix the <b>_EX-68.EXE<\/b> problem.<\/p>\n<h2>Malware Analysis of _EX-68.EXE<br \/>\nFull path on a computer: %WinDir%\\Temp\\_ex-68.exe<\/h2>\n<div id=\"alist\">\n<h3>Detected by <a href=\"http:\/\/www.unhackme.com\">UnHackMe<\/a>:<\/h3>\n<p>Item Name: MozillaAgent<br \/>\nAuthor: ROiASiLTI<br \/>\nRelated File: %WinDir%\\TEMP\\_EX-68.EXE<br \/>\nType: Registry Run<\/p>\n<p>Item Name: _ex-68.exe<br \/>\nAuthor: ROiASiLTI<br \/>\nRelated File: %WinDir%\\TEMP\\_EX-68.EXE<br \/>\nType: Running Processes<\/p><div class=\"wpInsert wpInsertInPostMy wpInsertMiddle\"><\/div>\n<h3>After first reboot detected by <a href=\"http:\/\/www.unhackme.com\">UnHackMe<\/a>:<\/h3>\n<p>Item Name: NPF<br \/>\nAuthor: CACE Technologies, Inc.<br \/>\nRelated File: %SYSDIR%\\DRIVERS\\NPF.SYS<br \/>\nType: Services detected by Partizan<\/p>\n<h3>Removal Results: Success<br \/>\nNumber of reboot: 1<\/h3>\n<\/div>\n<div id=\"blist\">\n<h3><strong>_EX-68.EXE<\/strong>  is known as:<\/h3>\n<p>Rootkit.MalOb-JI<\/p>\n<h3><strong>_EX-68.EXE<\/strong> hash:<\/h3>\n<ul>\n<li>MD5: e0e125bc1dc19ff62f12f28884183273\n<\/div>\n<div id=\"clist\">\nHow to quickly detect <strong>_EX-68.EXE<\/strong> presence?<\/p>\n<div class=\"icon\"><img loading=\"lazy\" title=\"Registry\" src=\"\/blog\/wp-content\/themes\/revolution-code-blue\/images\/reg.gif\" width=\"32\" height=\"32\" \/>Registry:<\/div>\n<ul>\n<li>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\MozillaAgent: &#8220;%WinDir%\\Temp\\_ex-68.exe&#8221;\n<li>HKLM\\System\\CurrentControlSet\\Enum\\Root\\LEGACY_NPF\\0000\\DeviceDesc: &#8220;WinPcap Packet Driver (NPF)&#8221;\n<li>HKLM\\System\\CurrentControlSet\\Services\\NPF\\ImagePath: &#8220;system32\\drivers\\NPF.sys&#8221;\n<li>HKLM\\System\\CurrentControlSet\\Services\\NPF\\DisplayName: &#8220;WinPcap Packet Driver (NPF)&#8221;\n<\/ul>\n<div class=\"icon\"><img loading=\"lazy\" title=\"Files\" src=\"\/blog\/wp-content\/themes\/revolution-code-blue\/images\/files.gif\" width=\"32\" height=\"32\" \/>Files:<\/div>\n<ul>\n<li>%SysDir%\\drivers\\npf.sys\n<li>%SysDir%\\Packet.dll\n<li>%SysDir%\\wpcap.dll\n<li>%WinDir%\\Temp\\_ex-68.exe\n<\/ul>\n<\/div>\n<p><!-- end --><\/p>\n<div class=\"wpInsert wpInsertInPostMy wpInsertBelow\" style=\"padding: 0px;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Rootkit _EX-68.EXE is software that enables continued privileged access to a computer while actively hiding its presence. Detection and removal of _EX-68.EXE may be a very difficult process. You should use anti-rootkit software to fix the _EX-68.EXE problem. Malware Analysis of _EX-68.EXE Full path on a computer: %WinDir%\\Temp\\_ex-68.exe Detected by UnHackMe: Item Name: MozillaAgent Author: [&hellip;]<br \/><a style=\"color: #42A2CE\" href=\"https:\/\/greatis.com\/blog\/rootkit\/_ex-68-exe-2.htm\"><u>More&#8230;<\/u><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2828],"tags":[5344,5673,94724],"_links":{"self":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts\/11869"}],"collection":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/comments?post=11869"}],"version-history":[{"count":0,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts\/11869\/revisions"}],"wp:attachment":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/media?parent=11869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/categories?post=11869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/tags?post=11869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}