Home / Spyware Encyclopedia / Rootkit.Small.saf << Back

Recommendation to Automatically remove Rootkit.Small.saf


Our products can remove Rootkit.Small.saf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.saf Details


  • Category Rootkit
  • Discovered 12/6/2012 2:40:02 PM
  • Modified 8/9/2023 3:12:01 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
be47deb50aedb6abfd7961654d1516b5f96b4d5f4e5b413ad65c825d049785aa.sys 11520  6cb6e781cca2bbe911b0b784a71d1981 
d000f43b828ba9f288cacb2d263dbe3c.sys 11520  d000f43b828ba9f288cacb2d263dbe3c 
f828d05b28acb1a4f3ffe26d857c9e07.sys 11520  f828d05b28acb1a4f3ffe26d857c9e07 
1e2429c1b5a02d83d5757a01ef945d19.sys 11520  1e2429c1b5a02d83d5757a01ef945d19 
86a2433229e36e434e28b70fcd437660.sys 11776  86a2433229e36e434e28b70fcd437660 
0ac5c4332e478cf8e57895931a42db40.sys 11776  0ac5c4332e478cf8e57895931a42db40 
2f13d34bafc64f0519516c0b82020f75.sys 11776  2f13d34bafc64f0519516c0b82020f75 
94a9d983ee2cac78f34c55e3208bb97078f70d763afb1cc36bc856e48ae06392.sys 11776  7e63fc0af79752718bd655dd7418aff7 
04933e823104abb086d19b926562d1554cfe731af0ea7867ffad55e4a3dca1e1.sys 11520  07d2e6cb87cf956422d5acbcaaa068d8 
b2006cc2db348c1f97c787a54d08a9f9.sys 11776  b2006cc2db348c1f97c787a54d08a9f9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware