Home / Spyware Encyclopedia / Rootkit.SMA.gen << Back

Recommendation to Automatically remove Rootkit.SMA.gen


Our products can remove Rootkit.SMA.gen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.SMA.gen Details


  • Category Rootkit
  • Discovered 8/29/2012 2:38:43 PM
  • Modified 11/2/2023 4:58:11 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d3750c87.exe 12288  30f6cb03c6c410f03fd942dc3cfe9ae8 
7e452b70f5333086e1abee83da8b1231.sys 12288  7e452b70f5333086e1abee83da8b1231 
d5618ff7ef7b2643f00c86605c9c1f1b.sys 12288  d5618ff7ef7b2643f00c86605c9c1f1b 
67068b34d558e78fe08e3136dc84a9a6.sys 12288  67068b34d558e78fe08e3136dc84a9a6 
5c063c017e0a7d1806ba079e75df444200d8b2c45dbecc1ffd71d53c196e6cf3.sys 12288  b737600f132529c52e39e650eaa56a1d 
3d5846a31e5c40665861e5e62c2026c2.sys 12288  3d5846a31e5c40665861e5e62c2026c2 
e135c09d7f59033c7af75e9bdc932327cd9d61d6968c377bea5b4d7ffb8a808bd373eef244e7397ab70d1a715dfd80ccbb0.sys 12288  3cfde8a05d6aadb721b2a84ba4e5931c 
e56a21620c9f575e692489cb7cb043d61c0330c6.bin.sys 12288  514ed713ebabbee9978afbf64fc21267 
a6a1142f35f48c4bc0705a33cdc24a03.sys 12288  a6a1142f35f48c4bc0705a33cdc24a03 
5219efbce032257aa3bcb6b26cda7cbf.sys 12288  5219efbce032257aa3bcb6b26cda7cbf 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware