Home / Spyware Encyclopedia / Rootkit.TDSS.accr << Back

Recommendation to Automatically remove Rootkit.TDSS.accr


Our products can remove Rootkit.TDSS.accr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.accr Details


  • Category Rootkit
  • Discovered 3/31/2011 3:15:26 PM
  • Modified 1/2/2024 10:34:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
26db6f63940a997e738bf34dab083650.exe 20480Microsoft Corporation5.1.2600.218026db6f63940a997e738bf34dab083650 
760762ef3ed358cf0d0fee3aaddee63e.sys 19968  760762ef3ed358cf0d0fee3aaddee63e 
0aaabdd633f97f40ba20e4e2b2867ad5.sys 19968  0aaabdd633f97f40ba20e4e2b2867ad5 
f1afd52d0f17836b2058192a514e8da5.sys 20480Microsoft Corporation5.1.2600.2180 (xpspf1afd52d0f17836b2058192a514e8da5 
218422ef64edb1eedc297eb96c864317.vir.sys 19968  218422ef64edb1eedc297eb96c864317 
00c5371aae7d90c88480b3c1abe70160.vir.sys 19968  00c5371aae7d90c88480b3c1abe70160 
f1d82cf899a52904cdbe2b570e45ab90.vir.sys 19968  f1d82cf899a52904cdbe2b570e45ab90 
c7a131e2724119ca574dc8427dd503d3.vir.sys 19968  c7a131e2724119ca574dc8427dd503d3 
c14ecce6efc0cf48dcb347e7a15cbf55.vir.sys 19968  c14ecce6efc0cf48dcb347e7a15cbf55 
9645a3a5a370533e2b2d998ce63fe224.vir.sys 19968  9645a3a5a370533e2b2d998ce63fe224 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware