Home / Spyware Encyclopedia / Rootkit.Plite.pvd << Back

Recommendation to Automatically remove Rootkit.Plite.pvd


Our products can remove Rootkit.Plite.pvd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Plite.pvd Details


  • Category Rootkit
  • Discovered 4/8/2024 4:20:01 PM
  • Modified 4/10/2024 10:50:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
20191117014257874851.exe 1065810Samsung Urban1, 0, 0, 85d678073dc34279a833fe43e3f7d34eda20/11/2019
20200415065718125296.exe 1066976Apple1, 0, 0, 85ce6ba72db3e1f136da6aa32b1fdcd5ce17/04/2020
20200413190141286349.exe 1049777Apple1, 0, 0, 8541766a054a9e97b86ca22b5d201c168717/04/2020
20200416183928902860.exe 1071404Apple1, 0, 0, 853ede58a7e87682ad1fb1db6d0d6ec0fc19/04/2020
20200418030107656042.exe 1104575  cff08c90ac1994758e70f45230652eb522/04/2020
e10f8c484a5e0550dfad1d8a2facc4f6.exe 1645805  e10f8c484a5e0550dfad1d8a2facc4f622/12/2021
dd8731e1ac97f5ac3aebea034fa4b5809cf0f323ee6e04b7259437e2fc2e8ee4.mrg.exe 2162111  1b0e0ccc849146b1b28ebabfce4b078511/03/2022
1e8875dfaf432f91125e5b783ba06803.exe 1383349  1e8875dfaf432f91125e5b783ba0680327/04/2023
024268d6567e3f478c9e21ce5695228c.bin.exe 2454809  024268d6567e3f478c9e21ce5695228c08/04/2024
3004629c643dcb6d4491ced1f04914f0.exe 1253857  3004629c643dcb6d4491ced1f04914f018/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware