Home / Spyware Encyclopedia / Rootkit.Small.h << Back

Recommendation to Automatically remove Rootkit.Small.h


Our products can remove Rootkit.Small.h and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.h Details


  • Category Rootkit
  • Discovered 8/8/2023 1:34:08 PM
  • Modified 8/9/2023 3:12:30 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
446d6dd1b0b75423790eec19500e37ab.vir.exe 822966 1.00.0001446d6dd1b0b75423790eec19500e37ab 
98904dc6c431acfbd1ca947e2eb3de69.exe 1811968 3.0098904dc6c431acfbd1ca947e2eb3de69 
rootkit.win32.small.h-27228a8c62e8507294c83fa660b8e270bec4fb06.exe 806912  8481ca4f1092eedb74ac4b0aeb5436d609/08/2023
rootkit.win32.small.h-4da37b0aa61462879f342635b9bc728a8ee3d0d17bdb13c7b3d85f1ab6543a9e.exe 1826166  9e5f488a4ff6966a4eb2c8f2edca5a4d24/07/2023
07f8e0a177fe6231a13d72a8a557782a.vir.exe 997152 2.0007f8e0a177fe6231a13d72a8a557782a 
36ef8f61bf003339fe6b9df40f95e2ef.vir.exe 822754 2.0036ef8f61bf003339fe6b9df40f95e2ef 
15f4a0e65e384cdb03ad8b94003a6609.vir.exe 812742 3.0015f4a0e65e384cdb03ad8b94003a6609 
d257b4d59363a59e71b40b9bf1e2d0c8.vxe.exe 806400 2.00d257b4d59363a59e71b40b9bf1e2d0c8 
3b427be44283f4659176be95912aadbd.vxe.exe 829164 2.003b427be44283f4659176be95912aadbd 
5cfa68648c14389bb7d01392a08743a0.exe 1808964 3.005cfa68648c14389bb7d01392a08743a0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware