Home / Spyware Encyclopedia / Rootkit.Small.bfz << Back

Recommendation to Automatically remove Rootkit.Small.bfz


Our products can remove Rootkit.Small.bfz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bfz Details


  • Category Rootkit
  • Discovered 9/11/2012 4:41:38 PM
  • Modified 8/26/2024 11:10:33 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3ff5428c02554582a59d8bf6ca4b08f4.exe 1012224TENCENT3.1.1.13ff5428c02554582a59d8bf6ca4b08f4 
2b2ad0f5aa7c8c7bcd681d32316c998f.exe 651570  2b2ad0f5aa7c8c7bcd681d32316c998f 
9ffaa28aa003b49fb6e52c0355ef3405.exe 1013760TENCENT3.1.1.19ffaa28aa003b49fb6e52c0355ef3405 
fcf21b58929a8f9b975dbbee9889e900.exe 162816  fcf21b58929a8f9b975dbbee9889e900 
ca303b31f42b43e204db7c4412bd0049.jpg.exe 239104Tencent1.65.2211.0ca303b31f42b43e204db7c4412bd0049 
220403b1701810be1af129d3013d71a13b3df21c.bin.exe 2568192 6.4.0.2aa3208ac70ee0fee52f2e03a664d39bb 
ecc0a81ccf975f441f0054976d7990ca.exe 476160 1.0.0.0ecc0a81ccf975f441f0054976d7990ca 
d1621d2044d57647f61e20d817eecbc361330ae4.bin.exe 1871872 1.0.0.09a7dc1611046a22d8342832214f3910a 
2699fbd7281e5eace989dc9c9f2ed6287d36829f435e2e8cc9faf754a1772222.sys 9728  3b401b9eafcb7dcc97e59a88bd779c37 
6895ee8453fcd1a2dbd40eb49660adef61610c93.bin.exe 2023424 6.4.0.2e1e6e94939b1c83c8f02b7f3c024ba58 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware