Home / Spyware Encyclopedia / Rootkit.Tiny.kd << Back

Recommendation to Automatically remove Rootkit.Tiny.kd


Our products can remove Rootkit.Tiny.kd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Tiny.kd Details


  • Category Rootkit
  • Discovered 7/3/2012 7:14:27 PM
  • Modified 5/11/2020 12:54:49 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2b8c9630b629b772f5682c7acbe1cfd9aa4679ce.bin.exe 39424NHN Corp.1.0.0.9af5562ff462b6d97f020e330dd878d8b 
2f81c734e11f7f1dab8641016107a869.vxe.exe 39424NHN Corp.1.0.0.92f81c734e11f7f1dab8641016107a869 
4749575d1b929f6f03f196ad6c7d04ee8d940dbd.bin.exe 40448NHN Corp.1.0.0.98fb5b6fcad0d7e67bf750a9194f19dfc 
878f4800a2986083429abb8ee0f6f933.exe 37666  878f4800a2986083429abb8ee0f6f933 
5291c52850d9916f6d5136638895b79d.exe 37666  5291c52850d9916f6d5136638895b79d 
a9ac8ee4c30660420d7e0c86ec270024.exe 37765  a9ac8ee4c30660420d7e0c86ec270024 
a89ae8ea99eef32fc63d652a2cdb5d1c.exe 37744  a89ae8ea99eef32fc63d652a2cdb5d1c 
6417bc6e4872f41a080c971d2b216f77.exe 39424NHN Corp.1.0.0.96417bc6e4872f41a080c971d2b216f77 
295345d81ddef88be349d6d666775777.exe 39424NHN Corp.1.0.0.9295345d81ddef88be349d6d666775777 
3fa4536b5c7259d26156776361f03602.exe 39424NHN Corp.1.0.0.93fa4536b5c7259d26156776361f03602 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware