Home / Spyware Encyclopedia / Rootkit.HareBot.dx << Back

Recommendation to Automatically remove Rootkit.HareBot.dx


Our products can remove Rootkit.HareBot.dx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HareBot.dx Details


  • Category Rootkit
  • Discovered 5/2/2012 7:45:34 PM
  • Modified 8/9/2023 3:11:46 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ebd6c9d01d7e617e9d0daa9bb4bd8745.exe 42496  ebd6c9d01d7e617e9d0daa9bb4bd8745 
81ff56d2310d11d5e963de0a85e51d18.exe 42496  81ff56d2310d11d5e963de0a85e51d18 
72b792d012cd30433af21b8c8332d6414e450ae9.bin.exe 42496  efee23aa54786eb5b517787fc5adb778 
6800224820dd92a91303fecc38a7838f.exe 42496  6800224820dd92a91303fecc38a7838f 
f51acc4f1058d7badaf9870c98816f1b.exe 42496  f51acc4f1058d7badaf9870c98816f1b 
5d55260a3c140ffe47267b667a35bdf2.exe 42496  5d55260a3c140ffe47267b667a35bdf2 
dc472fe2f894147bb256246582fe69c5e05b01fa05e68c356bd4a27a28e3c549.exe 42496  29dac4fd072e8f0425debd4ec3dcce45 
02c3efbdcc608a48589f94e2adedb30e.exe 42496  02c3efbdcc608a48589f94e2adedb30e 
fbf3662758a06009b2e206525d1ec6d7ba10d80cf97d643ce4578240a0048508.exe 42496  3fc35f0a73c9bfe7b69a5333e2b5d126 
e93ea06581fcd5b1e10a3b66eb8ffa1c.exe 42496  e93ea06581fcd5b1e10a3b66eb8ffa1c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware