Home / Spyware Encyclopedia / Rootkit.Small.vkd << Back

Recommendation to Automatically remove Rootkit.Small.vkd


Our products can remove Rootkit.Small.vkd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.vkd Details


  • Category Rootkit
  • Discovered 2/23/2016 1:38:40 AM
  • Modified 12/19/2022 12:09:20 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1a1dd85b2639c9bf0aa402405ca20db7.vir.exe 265537  1a1dd85b2639c9bf0aa402405ca20db7 
04a0f2ba81e15b90ca9e5e1272de585c.exe 265537  04a0f2ba81e15b90ca9e5e1272de585c 
1f4d0ab7978613c40a7b7669e9f4bdc5.vir.exe 265537  1f4d0ab7978613c40a7b7669e9f4bdc5 
28ffbb39097926acb8340aa5748954e4.exe 265537  28ffbb39097926acb8340aa5748954e4 
33fbe904d7d9b70be54fbb70765e06db.exe 265537  33fbe904d7d9b70be54fbb70765e06db 
3ab279733a7e709822afeceb74e54731.vir.exe 265537  3ab279733a7e709822afeceb74e54731 
32cf29de9470f91737dbc3e33d126a98.exe 265537  32cf29de9470f91737dbc3e33d126a98 
2d334ee38b0747310defbf82e5b73331.vir.exe 265537  2d334ee38b0747310defbf82e5b73331 
39e6f769f1ba9e60f380fd469d520d51.vir.exe 265537  39e6f769f1ba9e60f380fd469d520d51 
0a71988b038d955b080e06cfe2a5c5c3.vir.exe 265537  0a71988b038d955b080e06cfe2a5c5c3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware