Home / Spyware Encyclopedia / Rootkit.Small.saf << Back

Recommendation to Automatically remove Rootkit.Small.saf


Our products can remove Rootkit.Small.saf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.saf Details


  • Category Rootkit
  • Discovered 12/6/2012 2:40:02 PM
  • Modified 8/9/2023 3:12:01 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3946751476c26a0bbad801d30baecd45.sys 11520  3946751476c26a0bbad801d30baecd45 
d000f43b828ba9f288cacb2d263dbe3c.sys 11520  d000f43b828ba9f288cacb2d263dbe3c 
8b926aeac05ff4d6827498fa52483c96.sys 11520  8b926aeac05ff4d6827498fa52483c96 
04dcab21eabadb8cfeb2c612744b4733.sys 11520  04dcab21eabadb8cfeb2c612744b4733 
0ac5c4332e478cf8e57895931a42db40.sys 11776  0ac5c4332e478cf8e57895931a42db40 
2f13d34bafc64f0519516c0b82020f75.sys 11776  2f13d34bafc64f0519516c0b82020f75 
37415a6b526fcea98a20857c377db845.sys 11776  37415a6b526fcea98a20857c377db845 
402866f6ca7e770b9fe13b14218a8767c644dd05ae05811d09bed4f62d2dfcdf.sys 11776  0a8e4d1fdf106447b46a5b4ccad55dce 
1e2429c1b5a02d83d5757a01ef945d19.sys 11520  1e2429c1b5a02d83d5757a01ef945d19 
94fa317fe7fad3165ad6c1cf9005e284782304fa8b72a5b8eccffc355b54a8f8.sys 11520  8bd4960e26bbccafb1f4108b8f28ec14 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware