Home / Spyware Encyclopedia / Rootkit.Small.bsf << Back

Recommendation to Automatically remove Rootkit.Small.bsf


Our products can remove Rootkit.Small.bsf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bsf Details


  • Category Rootkit
  • Discovered 4/4/2015 5:17:10 PM
  • Modified 5/14/2022 1:40:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
14a43ef9f46cffdfc6bf782ca0fa95ec.vir.exe 57354  14a43ef9f46cffdfc6bf782ca0fa95ec 
36e6d6ca84306ac6d6102ea74f6a14e2.vir.exe 57354  36e6d6ca84306ac6d6102ea74f6a14e2 
3769f82525e885a0e6af00af32e5800c.vir.exe 57354  3769f82525e885a0e6af00af32e5800c 
20d09a08cb8faadc93fe4d5e55b1942b.vir.exe 57354  20d09a08cb8faadc93fe4d5e55b1942b 
386c25e0c13e9de42e5fbbc6eef31a4f.vir.exe 57354  386c25e0c13e9de42e5fbbc6eef31a4f 
3f04b25c3f2848e63851d02ff7c7d9aa.vir.exe 57354  3f04b25c3f2848e63851d02ff7c7d9aa 
1a24e6b1bbc68207958efa5815b9572e.vir.exe 57354  1a24e6b1bbc68207958efa5815b9572e 
2a7c04d2e9651c2924c89f9796648d6c.vir.exe 57354  2a7c04d2e9651c2924c89f9796648d6c 
1bb2025232898a3d84e5436c7117d1db.vir.exe 57354  1bb2025232898a3d84e5436c7117d1db 
03fee8be6993eb8434d5e35bf0c0f98e.vir.exe 57354  03fee8be6993eb8434d5e35bf0c0f98e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware