Home / Spyware Encyclopedia / Rootkit.Small.wl << Back

Recommendation to Automatically remove Rootkit.Small.wl


Our products can remove Rootkit.Small.wl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.wl Details


  • Category Rootkit
  • Discovered 4/18/2011 4:34:31 PM
  • Modified 1/2/2024 10:34:48 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cf460e5014a8d914dbbe3d58d9a81b25.sys 8192  cf460e5014a8d914dbbe3d58d9a81b2521/07/2023
2cac3a7947a3599587f562baa080d553ee563fbabf20f70bed51f1cb36cdf809.sys 2976  a7750dd96c575c4867388dc272da7d2a 
b72f9081c55dc6cc977e98bf6fe4c13050c8cdfae667a54547a15f577c0a7101.sys 2976  7840f3f8d5473faee21d2bbd64c075d4 
cebdfed1cc426e258301ea421502b91a.sys 2976  cebdfed1cc426e258301ea421502b91a 
cf460e5014a8d914dbbe3d58d9a81b25.sys 8192  cf460e5014a8d914dbbe3d58d9a81b25 
20373701905db233ea92c0bb5b942613c35edd2229a9dd8b1d2e2218b777a70d2eb28d565645b449e594b4b5d3f11.sys 2976  04fcb4437a91151cd81121b77e89868f 
ead2da623834f43520332bee58009a87.sys 2976  ead2da623834f43520332bee58009a87 
7b5dc2ee.exe.sys 2976  675b135d734c84dfb7406f814002649e 
ac49752f.exe 2976  168f596459e0d67a50420f10eccafaba 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware