Home / Spyware Encyclopedia / Rootkit.Small.bfz << Back

Recommendation to Automatically remove Rootkit.Small.bfz


Our products can remove Rootkit.Small.bfz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bfz Details


  • Category Rootkit
  • Discovered 11/2/2012 4:43:36 PM
  • Modified 5/4/2021 12:55:28 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
887f26cba829e617007132ca392f0d8461450cf5c3225a61edae8379c28868378abdfa32e8ae8d781c0b1de1faa3e5b07a5.exe 1212416  a863ef4ce4c0bf355472c838cfa7f797 
9729c70edefe288f862dace26f01e284.exe 506368  9729c70edefe288f862dace26f01e284 
624bf9a36b174a63199cd4906b91f88f.exe 1432064period of time6.4.0.2624bf9a36b174a63199cd4906b91f88f 
ac2568234d6d406eb7191934b7779ede.exe 1032192  ac2568234d6d406eb7191934b7779ede 
ea2006e759a6073389ef89d27d45ab9ab5c75091.bin.exe 636416  6c05b601e6a3d37640729565cb533ef6 
7f2cd002acab77895dbd4a69a3a80945.exe 698880  7f2cd002acab77895dbd4a69a3a80945 
e95f36f604b50b8ef43f8d889a7d5ea443a3bab5548b9d832d782f9de8ed811f.exe 719360  21ff2b5b138c98bf0e79083bda26f8dc 
92b29442bdec3a5ca54e19109d0e5ca8.exe 1056256by进进3.4.0.092b29442bdec3a5ca54e19109d0e5ca8 
a108a8855e6016225cb10a229747fd8b.exe 512000 4.12.04.08a108a8855e6016225cb10a229747fd8b 
4f3c8d5473cf337dadbff25a3d8fb801.exe 1069056  4f3c8d5473cf337dadbff25a3d8fb801 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware