Home / Spyware Encyclopedia / Rootkit.Small.yf << Back

Recommendation to Automatically remove Rootkit.Small.yf


Our products can remove Rootkit.Small.yf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.yf Details


  • Category Rootkit
  • Discovered 7/24/2023 4:39:37 AM
  • Modified 7/24/2023 3:12:12 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb8074ca62cc3f1feec23737d39f4911.vir.exe 55808  fb8074ca62cc3f1feec23737d39f4911 
rootkit.win32.small.yf-13e2f3c5cc6b9a5ddbf7729be6b42351276c0e1b25a90208c57891ade68b0893.exe 55808  a2d8a395bfe3594fb9c0bc12d70638a324/07/2023
rootkit.win32.small.yf-9b81307b4514cac8e7cb7909610902e3ea0cd02b.exe 55808  5721da763954a814b4e789dceaf607a108/08/2023
220bcfd52cb062e4ff4250e95ba26796.sys 5120  220bcfd52cb062e4ff4250e95ba2679608/08/2023
649542316b987a5603649aa33ee20b35.vir.exe 55808  649542316b987a5603649aa33ee20b35 
bbbdbbac67b9335424cad98a1a534740.vir.exe 55808  bbbdbbac67b9335424cad98a1a534740 
33e43a28f57db9f51ad731fb1dfd730e.vir.exe 55808  33e43a28f57db9f51ad731fb1dfd730e 
d7d70c14257dc9a803ece6bb22959866.vir.exe 55808  d7d70c14257dc9a803ece6bb22959866 
1117580093496326b1387be2884b59e474412d42abbb109e39c400984f1b940f0971125a2fffbb30decfb4a9eff02.exe 55808  4fdc4712ce3f04ed7f88db7cf8be41c6 
eed7aa87ea800dac0499f66eb90b2aee.vir.exe 55808  eed7aa87ea800dac0499f66eb90b2aee 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware