Home / Spyware Encyclopedia / Rootkit.TDSS.cy << Back

Recommendation to Automatically remove Rootkit.TDSS.cy


Our products can remove Rootkit.TDSS.cy and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.cy Details


  • Category Rootkit
  • Discovered 10/1/2011 9:58:21 AM
  • Modified 8/1/2023 4:13:36 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
11bbd0968c307115131679692bac93f7.exe 23552  11bbd0968c307115131679692bac93f7 
4057fa64835a1c7ce8cdae9b4c4be056.exe 23552  4057fa64835a1c7ce8cdae9b4c4be056 
aa09301e8054420a2590c7a227b53c7f.exe 23552  aa09301e8054420a2590c7a227b53c7f 
3837bf6d691062a0cb433aa2313f2304.exe 23552  3837bf6d691062a0cb433aa2313f2304 
0b1e6210bad24eca2ee59d64f1788b32.exe 23552  0b1e6210bad24eca2ee59d64f1788b32 
f1eda6ac4bae334f6cdb9169d2e4b5a5.sys 23552  f1eda6ac4bae334f6cdb9169d2e4b5a5 
3ec058540c44d9659f6257f081535e1c721e3225.bin.dll 126976Semaphore inc (C)5,47,50,60433fe32f7965e128e2d60501993ac851c7 
923d39a0b6d6668891fdceb7b1926e7e.sys 53244  923d39a0b6d6668891fdceb7b1926e7e 
196a21d13632b9597ecf65160f9e103f 23552  196a21d13632b9597ecf65160f9e103f 
5437bb2d6f4792a47f0a9011637ae48f 23552  5437bb2d6f4792a47f0a9011637ae48f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware