Home / Spyware Encyclopedia / Rootkit.HareBot.dx << Back

Recommendation to Automatically remove Rootkit.HareBot.dx


Our products can remove Rootkit.HareBot.dx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.HareBot.dx Details


  • Category Rootkit
  • Discovered 5/2/2012 7:45:34 PM
  • Modified 8/9/2023 3:11:46 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e345d3361f333907535fc8e349a45aed.exe 42496  e345d3361f333907535fc8e349a45aed 
dc472fe2f894147bb256246582fe69c5e05b01fa05e68c356bd4a27a28e3c549.exe 42496  29dac4fd072e8f0425debd4ec3dcce45 
ab6f51bfaebfb430e938935df96b209453e9f346.bin.exe 42496  fcfb0bc58d8efc897cb0ec7cd356b40e 
fc4160cae61aac1794c11dea96c6157f.exe 42496  fc4160cae61aac1794c11dea96c6157f 
52f384e732e7ade2b4b30079d6630e7c.exe 42496  52f384e732e7ade2b4b30079d6630e7c 
5d949c014e9c4d3bf7392105a524646a.exe 42496  5d949c014e9c4d3bf7392105a524646a09/08/2023
50233977c1a0f605f6d2884fcc156e8d.vir.exe 42496  50233977c1a0f605f6d2884fcc156e8d 
492e2db8c9bb09f12e142278396bbca5.vir.exe 42496  492e2db8c9bb09f12e142278396bbca5 
7745885833fa78c89020903afd695902.vir.exe 42496  7745885833fa78c89020903afd695902 
7c1633102ed743b280c75d5319c679c9.vir.exe 42496  7c1633102ed743b280c75d5319c679c9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware