Home / Spyware Encyclopedia / Rootkit.Small.bfz << Back

Recommendation to Automatically remove Rootkit.Small.bfz


Our products can remove Rootkit.Small.bfz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bfz Details


  • Category Rootkit
  • Discovered 9/11/2012 4:41:38 PM
  • Modified 8/26/2024 11:10:33 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c85d50cf66dd06870d398b41ff79b3e5.exe 671744 1.0.0.0c85d50cf66dd06870d398b41ff79b3e5 
9990ed15d13b107e917aa6183136c09564b65670e26e286b63d13a96be5c2b8cdefef0f4393e54d2eb6614d8565d01025fe.exe 293376扬光1.0.0.0dc92aec6874001edde2213e102627917 
12f13befde11574be34229028eaadb2c.dll 1310720 1.0.0.012f13befde11574be34229028eaadb2c 
3ff5428c02554582a59d8bf6ca4b08f4.exe 1012224TENCENT3.1.1.13ff5428c02554582a59d8bf6ca4b08f4 
07d31f7f1c4787d2cc4b5a27bdb773f5.exe 507904  07d31f7f1c4787d2cc4b5a27bdb773f5 
9ffaa28aa003b49fb6e52c0355ef3405.exe 1013760TENCENT3.1.1.19ffaa28aa003b49fb6e52c0355ef3405 
2b2ad0f5aa7c8c7bcd681d32316c998f.exe 651570  2b2ad0f5aa7c8c7bcd681d32316c998f 
e3c8186dad20134b89146d072c1da078.exe 497664  e3c8186dad20134b89146d072c1da078 
fcf21b58929a8f9b975dbbee9889e900.exe 162816  fcf21b58929a8f9b975dbbee9889e900 
ca303b31f42b43e204db7c4412bd0049.jpg.exe 239104Tencent1.65.2211.0ca303b31f42b43e204db7c4412bd0049 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware