Home / Spyware Encyclopedia / Rootkit.Small.rbd << Back

Recommendation to Automatically remove Rootkit.Small.rbd


Our products can remove Rootkit.Small.rbd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.rbd Details


  • Category Rootkit
  • Discovered 5/28/2016 1:46:53 AM
  • Modified 5/28/2016 1:22:04 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
114609082334d85cec1166cadc94f6e46044ddc535fb5ba846a1725423ca24f2751f846915d1148e78fc4e580f567.exe 474624Tommsoft.com2.8.2.927e3b69d61fe443d1d22382d19553629 
585ff555b1c6d5e9ade5fd52cd5047b2.vir.exe 1199104Tommsoft.com2.8.2.9585ff555b1c6d5e9ade5fd52cd5047b2 
4cddc69d2b643e4a2b42f952bb483c96.vir.exe 474624Tommsoft.com2.8.2.94cddc69d2b643e4a2b42f952bb483c96 
df7ba0cbe5a9979b963a227dfce44f5bfc7aae8c9ca2aa96643de1acdb2f3fd781305200cb03098478adfa2453269c08a79.exe 1252864Tommsoft.com2.8.2.932cdb809e12d2bd65c0a3ef69485f748 
d7367a66ceed45037a0324b375642588.exe 475136Tommsoft.com2.8.2.9d7367a66ceed45037a0324b375642588 
4e421ce74a3a704908f2b54b3b00b8f4.vir.exe 1199616Tommsoft.com2.8.2.94e421ce74a3a704908f2b54b3b00b8f4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware