Home / Spyware Encyclopedia / Rootkit.Small.scr << Back

Recommendation to Automatically remove Rootkit.Small.scr


Our products can remove Rootkit.Small.scr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.scr Details


  • Category Rootkit
  • Discovered 8/2/2023 12:35:10 AM
  • Modified 8/2/2023 6:04:44 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
dc98faabd486f4c54eebf40840feb3eedb8e4a150eca3b6ea50af906360c01bc.sys 13696  2362504fe1a4b7633fb6fc95dfeb7869 
rootkit.win32.small.scr-111460279974f7927d4f0a8b4a6272962c01729b.exe 13696  b307bce69ee0d3eead9b86a2f767b7d502/08/2023
35f62ba889d68fcd218cab4cddb3323c.exe 13696  35f62ba889d68fcd218cab4cddb3323c14/10/2022
b2aa0939dd6e6208238c54a9872bf7c3.exe 13696  b2aa0939dd6e6208238c54a9872bf7c308/02/2022
5c669aeb1b77b7a2e80c5c6a8ae7f3c818896eefbec3b2433108c31aa6c7c5e0.sys 13696  29ce08ebe2f44557e5956c7b2c1b207d13/01/2021
6f0110f6e75e20be317732b2f5d48c44.vir.sys 13696  6f0110f6e75e20be317732b2f5d48c44 
95658e591e3b71fb0ad0f8cacd000a15.vir.sys 13696  95658e591e3b71fb0ad0f8cacd000a15 
318be1e0234da7cea230d13aed0d2c41.vir.sys 13696  318be1e0234da7cea230d13aed0d2c41 
079e7051cb224a6ced43ef5fa9fc3e75.vir.sys 13696  079e7051cb224a6ced43ef5fa9fc3e75 
68c996193f1041e4f33475d63e4e92ff.vir.sys 13696  68c996193f1041e4f33475d63e4e92ff 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware