Home / Spyware Encyclopedia / Rootkit.Small.rc << Back

Recommendation to Automatically remove Rootkit.Small.rc


Our products can remove Rootkit.Small.rc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.rc Details


  • Category Rootkit
  • Discovered 4/4/2024 1:37:37 AM
  • Modified 4/4/2024 11:02:02 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
nsPass1.sys 8320  bcb95f01a1810c379bab6e2136bc73d8 
rootkit.win32.small.lc 8320  9dd2f68d8b80c298e9178f434eab750e 
rootkit.win32.small.ks 8320  2ec3dfc5b68cd6e6743d79d317d4b14d 
063ae56f544bd6d56cacef4a05d38f67c556da3b.{pe}.exe 8320  fa941bc2dcd29fd3ca3b72b6296c5102 
82066da6a5e3e6c0b6ee6543fb9875b7.sys 8320  82066da6a5e3e6c0b6ee6543fb9875b7 
11203806902d2a7eadcdd7acf65dd0c9876dd31e8d3b99dfbe3749187eda5fb6410ac837178cb6aea61ba61ced086.sys 8320  9494778fcd106c1d62ad9f7407e3866d 
80807b2b5a4c54b4f4b9c3f540d4d991.sys 8320  80807b2b5a4c54b4f4b9c3f540d4d991 
877ed25a984b7f8f07d902f9687a8748.sys 8320  877ed25a984b7f8f07d902f9687a8748 
b389a0b85c0acd36c3c59882adb9f16e4ab540a657457180698c02f19b34bf79.sys 8320  257633564240e098e37bd4a8584b58fc 
1cc7d410141c1e343e579c50d7e3e34d.sys 8320  1cc7d410141c1e343e579c50d7e3e34d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware