Home / Spyware Encyclopedia / Rootkit.Small.vz << Back

Recommendation to Automatically remove Rootkit.Small.vz


Our products can remove Rootkit.Small.vz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.vz Details


  • Category Rootkit
  • Discovered 9/6/2012 6:32:55 PM
  • Modified 7/24/2023 3:07:53 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
B540B19E.EXE 14720  a8cfe427501f50ccb92ed90ec682179c 
99e9fa89fcae721afad8b606463269c2.sys 14720  99e9fa89fcae721afad8b606463269c2 
bac0debe6c7335d9d0127bd493f56061.vir.sys 57856  bac0debe6c7335d9d0127bd493f56061 
ba5c8f4ed78bbab284c3d6b8acf28309b2f7b1a92d7f2c4448ce23082c298e74.sys 14720  4670b47c419aace291a5b0b93ae6c8b512/12/2020
rootkit.win32.small.vz.b348e9e631f5536dc5fb1b28fceb438e.exe 14720  b348e9e631f5536dc5fb1b28fceb438e14/08/2020
91f886aab4d540d9a1e21840ec8d4545.vir.sys 28420  91f886aab4d540d9a1e21840ec8d4545 
32dc446b7c4075019e7feeff15cdec35e622b2347df7fecb59a3cdd6a6594514.sys 15744Beijing Rising Information Technology Co., Ltd.21, 0, 0, 2efee627ed50641050ebb5a971534abb6 
4f7dab42027e780d4986138238da7571a03cfe03.bin.sys 15744Beijing Rising Information Technology Co., Ltd.21, 0, 0, 2032ebe39a8ab3c26c41c892518a21ec5 
ba5c8f4ed78bbab284c3d6b8acf28309b2f7b1a92d7f2c4448ce23082c298e74.sys 14720  4670b47c419aace291a5b0b93ae6c8b5 
89bf58a3fb04fe3186f1c94b7c91deca.sys 16444  89bf58a3fb04fe3186f1c94b7c91deca 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware