Home / Spyware Encyclopedia / Rootkit.TDSS.uym << Back

Recommendation to Automatically remove Rootkit.TDSS.uym


Our products can remove Rootkit.TDSS.uym and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.uym Details


  • Category Rootkit
  • Discovered 4/29/2011 11:28:26 AM
  • Modified 2/22/2019 11:44:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
27fbb06b987c3c1b5d548c4e64f75416.exe 124928©Winasm Corporation5.1.5.027fbb06b987c3c1b5d548c4e64f75416 
042c319b235031d67cf15b4da1911ec6.exe 124928©Winasm Corporation5.1.5.0042c319b235031d67cf15b4da1911ec6 
06ddfd86a5d5ed8898773117798ce7ff.exe 124928©Winasm Corporation5.1.5.006ddfd86a5d5ed8898773117798ce7ff 
9d763b342893404b5b838c351c3cf39b2039fd071f6863b2489373daaac52c56.exe 124928©Winasm Corporation5.1.5.07bec7eb30a961dbb43138de8558beaad 
513ddd3cbb71d42d0c10c08cc662e3d6856cefbe5f1f63d29974cc7bf9eca5ff.exe 124928©Winasm Corporation5.1.5.0724a4cdf79c3fd55f095821458e42309 
41ed28ab1861fabf8c20107205c12881.exe 124928©Winasm Corporation5.1.5.041ed28ab1861fabf8c20107205c12881 
3f91570c5951a55dc026b151ca846cf8.exe 124928©Winasm Corporation5.1.5.03f91570c5951a55dc026b151ca846cf8 
414125cf4628e8a3f16aae32d2978f0a.exe 124928©Winasm Corporation5.1.5.0414125cf4628e8a3f16aae32d2978f0a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware