Home / Spyware Encyclopedia / Rootkit.SMA.gen << Back

Recommendation to Automatically remove Rootkit.SMA.gen


Our products can remove Rootkit.SMA.gen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.SMA.gen Details


  • Category Rootkit
  • Discovered 8/29/2012 2:38:43 PM
  • Modified 11/2/2023 4:58:11 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c7f4dd8cc18009765b10c6fa3c1717aa.sys 12288  c7f4dd8cc18009765b10c6fa3c1717aa 
5c063c017e0a7d1806ba079e75df444200d8b2c45dbecc1ffd71d53c196e6cf3.sys 12288  b737600f132529c52e39e650eaa56a1d 
23aba24c7957a34a29e7c345be731bc9.sys 12288  23aba24c7957a34a29e7c345be731bc9 
e135c09d7f59033c7af75e9bdc932327cd9d61d6968c377bea5b4d7ffb8a808bd373eef244e7397ab70d1a715dfd80ccbb0.sys 12288  3cfde8a05d6aadb721b2a84ba4e5931c 
5219efbce032257aa3bcb6b26cda7cbf.sys 12288  5219efbce032257aa3bcb6b26cda7cbf 
be4eb3da2e39339df5b23f61be52ea45cc46eee39a96f6292b7e80bfb2c16ea01ba7d7d144ec308fcb0f80ca1fe0afeaf55.sys 12288  1d2b89fe9c12efb55d7bece5a5fb588f 
89b226a5eb6f8cc10a97011ce4d3df0dc88bc0fa.bin.sys 12288  1809435316e0401620257b0dccc1a169 
d1c8e5338c226035dcfd96c37398a3188a364730ec0b3b95c4042be536addb5c.sys 12288  553b14296ce2fbf1dcd9a24f9978dc28 
81af41d99e1f235285b50ab9712f78c1.sys 12288  81af41d99e1f235285b50ab9712f78c1 
ecca4669950cc603bc65372cf842aa1c.sys 12288  ecca4669950cc603bc65372cf842aa1c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware