Home / Spyware Encyclopedia / Rootkit.Small.scr << Back

Recommendation to Automatically remove Rootkit.Small.scr


Our products can remove Rootkit.Small.scr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.scr Details


  • Category Rootkit
  • Discovered 8/2/2023 12:35:10 AM
  • Modified 8/2/2023 6:04:44 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
27734fd4652c51396137f32966ac3db4.sys 13696  27734fd4652c51396137f32966ac3db4 
2102e1ae9ce18a35ebf57c5bb1e9d262.sys 13696  2102e1ae9ce18a35ebf57c5bb1e9d262 
1f8f9a9d8bd946f40a323208c9008f1e.sys 13696  1f8f9a9d8bd946f40a323208c9008f1e 
da44b55177b62c79728478fb92bd68f1.sys 13696  da44b55177b62c79728478fb92bd68f1 
dc98faabd486f4c54eebf40840feb3eedb8e4a150eca3b6ea50af906360c01bc.sys 13696  2362504fe1a4b7633fb6fc95dfeb7869 
154629078143de163c8b804d43f8bbc8bb6cfc66eeb0de87f2efd765d926dfde9fca94522a013966b08a1ab013cf5.sys 13696  6ae9590db1a494c9946aecb8c89c696c 
eda8a3fa23052f154f472af30655e071c0ac345d208f860d4785d6ba85eb2a63.sys 13696  fe42bf26589c4534273229114c6197ae 
ecf68ed36bd040404e8e238711b74cfaa383bb42e63f85fe2bd97f3167c58462.sys 13696  eb6b9052af1d8c7621bd4b355ea783ad 
9f8472f87616a914a0c3c25c7663a83c96f92b76a91791c04b6f8c0325e99a0d.sys 13696  a0b760b07515cf18ef0ecf9e9392984f 
81b0983cd9775d4831a462ed2935cfddc96ecf8e550b1ca7890931c076fb4a9d.sys 13696  c0d84f59fb16676c041e5d26d0a61fba 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware