Home / Spyware Encyclopedia / Rootkit.Small.saf << Back

Recommendation to Automatically remove Rootkit.Small.saf


Our products can remove Rootkit.Small.saf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.saf Details


  • Category Rootkit
  • Discovered 12/6/2012 2:40:02 PM
  • Modified 8/9/2023 3:12:01 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d000f43b828ba9f288cacb2d263dbe3c.sys 11520  d000f43b828ba9f288cacb2d263dbe3c 
8b926aeac05ff4d6827498fa52483c96.sys 11520  8b926aeac05ff4d6827498fa52483c96 
f828d05b28acb1a4f3ffe26d857c9e07.sys 11520  f828d05b28acb1a4f3ffe26d857c9e07 
b2006cc2db348c1f97c787a54d08a9f9.sys 11776  b2006cc2db348c1f97c787a54d08a9f9 
86a2433229e36e434e28b70fcd437660.sys 11776  86a2433229e36e434e28b70fcd437660 
94fa317fe7fad3165ad6c1cf9005e284782304fa8b72a5b8eccffc355b54a8f8.sys 11520  8bd4960e26bbccafb1f4108b8f28ec14 
37415a6b526fcea98a20857c377db845.sys 11776  37415a6b526fcea98a20857c377db845 
5a3dbbf805fdac2cb50174f44e72e72d.sys 11776  5a3dbbf805fdac2cb50174f44e72e72d 
94a9d983ee2cac78f34c55e3208bb97078f70d763afb1cc36bc856e48ae06392.sys 11776  7e63fc0af79752718bd655dd7418aff7 
04933e823104abb086d19b926562d1554cfe731af0ea7867ffad55e4a3dca1e1.sys 11520  07d2e6cb87cf956422d5acbcaaa068d8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware