Home / Spyware Encyclopedia / Rootkit.TDSS.cb << Back

Recommendation to Automatically remove Rootkit.TDSS.cb


Our products can remove Rootkit.TDSS.cb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.cb Details


  • Category Rootkit
  • Discovered 9/28/2010 7:19:02 PM
  • Modified 8/3/2023 5:34:49 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
79gm793.dll 122368Sysinternals2.4.0.0d1d91911cce26914aea47b319d9a02b1 
k9y1ce3 122368Sysinternals2.4.0.025d9f77ab52b3b43b2e0117989aa7580 
1d8d4b6e27949b9d9cbd21cae0679ff9f73689a5b275193ba85af0f416edde9a.dll 122368Sysinternals2.40175a1f392cb6dc0240fdf5be7d1dccef 
01bb466535bfddf76550ae2bc2cc0c95.vir.exe 143729  01bb466535bfddf76550ae2bc2cc0c95 
1d3dcdfed7987517ac494a79f57ea6b1.vir.exe 122368Sysinternals2.401d3dcdfed7987517ac494a79f57ea6b1 
1d21bb48701e3a43bc9907e79c1ad0c9.vir.exe 122368Sysinternals2.401d21bb48701e3a43bc9907e79c1ad0c9 
17e700102ffb87bf8abb8c453540d3ec.vir.exe 122368Sysinternals2.4017e700102ffb87bf8abb8c453540d3ec 
1bc6dd045b30c1af3e37b878a0c11cf0.vir.dll 122368Sysinternals2.401bc6dd045b30c1af3e37b878a0c11cf0 
1ac1084c440f0f34c8f78938cc72ff09.vir.dll 122368Sysinternals2.401ac1084c440f0f34c8f78938cc72ff09 
b0d387910115fde0a837bb2fa933ef3a.vir.exe 122368Sysinternals2.40b0d387910115fde0a837bb2fa933ef3a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware