Home / Spyware Encyclopedia / Rootkit.HareBot.dx << Back

Recommendation to Automatically remove Rootkit.HareBot.dx


Our products can remove Rootkit.HareBot.dx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HareBot.dx Details


  • Category Rootkit
  • Discovered 5/2/2012 7:45:34 PM
  • Modified 8/9/2023 3:11:46 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e345d3361f333907535fc8e349a45aed.exe 42496  e345d3361f333907535fc8e349a45aed 
6800224820dd92a91303fecc38a7838f.exe 42496  6800224820dd92a91303fecc38a7838f 
f51acc4f1058d7badaf9870c98816f1b.exe 42496  f51acc4f1058d7badaf9870c98816f1b 
72c974e79c2b96aefacc8735abe64c71.exe 42496  72c974e79c2b96aefacc8735abe64c71 
f854c5b4357d780011a227fdddd0a154.exe 42496  f854c5b4357d780011a227fdddd0a154 
e93ea06581fcd5b1e10a3b66eb8ffa1c.exe 42496  e93ea06581fcd5b1e10a3b66eb8ffa1c 
52f384e732e7ade2b4b30079d6630e7c.exe 42496  52f384e732e7ade2b4b30079d6630e7c 
36e5f84d194e330962706f4e73569ebaf9c16a82.bin.exe 42496  492b372fe9018568da7a2f5b51673e82 
527e4c40aace7910e6b1f853c538ee9aa1898c69.bin.exe 42496  40a3b97dd899d1240862e8167c8e40a2 
dd233fab5336e7731e9196b03b86610a.vir.exe 42496  dd233fab5336e7731e9196b03b86610a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware