Home / Spyware Encyclopedia / Rootkit.Stoned.a << Back

Recommendation to Automatically remove Rootkit.Stoned.a


Our products can remove Rootkit.Stoned.a and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Stoned.a Details


  • Category Rootkit
  • Discovered 12/18/2011 2:26:25 PM
  • Modified 7/27/2023 4:44:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fc2a13ea.exe 4096  fdc56d620ba4462b89d7d57404ee292a 
sinowal extractor.sys 4096  fdc56d620ba4462b89d7d57404ee292a 
8c99244d.exe 329216  df439c1f253b29288b20439d32bc8220 
sinowal.sys 229504  d87eee6eef2767cf798d660891bd7188 
90e61612.exe 4096  610f79e72be06f7cfd43eee0a6ed3792 
black hat europe 2007 vipin kumar poc.sys 4096  610f79e72be06f7cfd43eee0a6ed3792 
988caae629c52ef211ed8effeab1d75d.vxe.exe 521216  988caae629c52ef211ed8effeab1d75d 
3f31e83893290b7557508404a8d8102a.exe 76961  3f31e83893290b7557508404a8d8102a 
cd89b9f7c292a933f95b184498864e8b.exe 53424  cd89b9f7c292a933f95b184498864e8b 
3f0f7df5eb91d71a704878cb0e4f140c29bed2b9c6586bc4e2b57241122deade.exe 198144  c4a4b31b048755d6eb96c90853220bf9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware