How to Remove “HookProcessCreation.dll”

4

Malware Entries

First Seen: 31 December 2008 at 5:59 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable 2ecd8eb47390ce95
3efcef6e11546a73
cf51553b
bd1990a4a9d9f949
37e19970958b1284
Unclassified
Malware
No N/A N/A Slovenia N/A
2 N/A Executable 2ecd8eb47390ce95
3efcef6e11546a73
cf51553b
bd1990a4a9d9f949
37e19970958b1284
Unclassified
Malware
No N/A N/A Ecuador N/A
3 N/A Executable 2ecd8eb47390ce95
3efcef6e11546a73
cf51553b
bd1990a4a9d9f949
37e19970958b1284
Unclassified
Malware
No N/A N/A Internal Submission N/A
4 N/A Executable 2ecd8eb47390ce95
3efcef6e11546a73
cf51553b
bd1990a4a9d9f949
37e19970958b1284
Unclassified
Malware
No N/A N/A United States N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
7

Safe Entries

First Seen: 07 January 2009 at 5:54 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable bafab744cc43da80
3a8975cf3a6dd849
16f53313
be7282f01c36d383
7d301338f425e316
No N/A N/A Internal Submission
2 N/A Executable c716b38d359fff71
89371780adeaf886
9c179b3a
720f321c89469b74
f6f8e574a6ec5611
No N/A N/A Internal Submission
3 N/A Executable 40aa517f4e370e38
8e322ad83c941375
23577509
38086e41f8ccb98b
c1c89bc9789a6caa
No N/A N/A Internal Submission
4 N/A Executable a2b613d0c27c703a
1e19be5f5bc31a83
20786785
3ba737c1084e3a7f
0d3b655bd86d50e2
No N/A N/A United States
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks