Home / Spyware Encyclopedia / Rootkit.Small.scr << Back

Recommendation to Automatically remove Rootkit.Small.scr


Our products can remove Rootkit.Small.scr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.scr Details


  • Category Rootkit
  • Discovered 8/2/2023 12:35:10 AM
  • Modified 8/2/2023 6:04:44 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
27734fd4652c51396137f32966ac3db4.sys 13696  27734fd4652c51396137f32966ac3db4 
2102e1ae9ce18a35ebf57c5bb1e9d262.sys 13696  2102e1ae9ce18a35ebf57c5bb1e9d262 
fb503ac5354bc7ae8cb929ce148e110e.sys 13696  fb503ac5354bc7ae8cb929ce148e110e 
1f8f9a9d8bd946f40a323208c9008f1e.sys 13696  1f8f9a9d8bd946f40a323208c9008f1e 
5c669aeb1b77b7a2e80c5c6a8ae7f3c818896eefbec3b2433108c31aa6c7c5e0.sys 13696  29ce08ebe2f44557e5956c7b2c1b207d 
16124803696551194cc23c669b6917245bdedcd3b692517ce09bcc03dbbf57ae662db1feed998ef85483ed4a5ad5f.sys 13696  9f138d2487529cf3f98e718392643c7b 
eda8a3fa23052f154f472af30655e071c0ac345d208f860d4785d6ba85eb2a63.sys 13696  fe42bf26589c4534273229114c6197ae 
470e791715a1e460111fb6680292c397.sys 13696  470e791715a1e460111fb6680292c397 
9f8472f87616a914a0c3c25c7663a83c96f92b76a91791c04b6f8c0325e99a0d.sys 13696  a0b760b07515cf18ef0ecf9e9392984f 
3da9917ae0265c90fc9c55ba5c306fb3.vir.sys 13696  3da9917ae0265c90fc9c55ba5c306fb3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware