Home / Spyware Encyclopedia / Rootkit.Small.gz << Back

Recommendation to Automatically remove Rootkit.Small.gz


Our products can remove Rootkit.Small.gz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.gz Details


  • Category Rootkit
  • Discovered 5/3/2011 9:04:57 AM
  • Modified 8/5/2023 2:45:52 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b8e260c8212724fd03e036dd87022b2a0ff6a5f014d079a440d34bbaa4cb20eb.exe 92715  ea195aca59074519cab454d63259f93a 
59eb6c930b61b9741d6a34ea8e2abe0aeed04474 0  007bd45fdddef61abfc11d1bbb045bad05/08/2023
53e144d498c96637abf3b53280564040.exe 27136  53e144d498c96637abf3b5328056404005/08/2023
669d91aced4ffa9543c5ea640ac70ca8c27d7c426d4625342a8892e58b3e2492.exe 653312  6187ee40a78b190ad45227fd8b5e187f 
19332202036db3216836c63b44eb3d2092b921042f3ee8559c451daeb0f6ec2af5f307d76a129d272dfd9477a5b1e.exe 225792  8fd8b66ebbc83f6bea2830f72bbae1f3 
17451708754932343a1a29ee2976b7d3cba9be4f31cf5367a0c367a6556eddae62fbd16b3b5c79b8bc958629caf27.exe 294912  1c12faaf4b84e904f0494c746f1697bb 
09aee8ec2b993637a4eadc333005db3f.exe 281088  09aee8ec2b993637a4eadc333005db3f 
da51e84981aafe1ee589d6d2746df078.exe 462670  da51e84981aafe1ee589d6d2746df078 
800ecd1d1098d2b78593f7442f777da3.exe 790528  800ecd1d1098d2b78593f7442f777da3 
b66a193103f36674d9853fc9a2ab7af7f22ac8017ac1bff26b6aad1cb4e14b7b.exe 200192  c03edb7207961c89e15048653bd0bec3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware