Home / Spyware Encyclopedia / Rootkit.Small.ayg << Back

Recommendation to Automatically remove Rootkit.Small.ayg


Our products can remove Rootkit.Small.ayg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ayg Details


  • Category Rootkit
  • Discovered 9/1/2012 1:40:24 PM
  • Modified 10/9/2024 3:32:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a90f655ead951908846fd1864eac7e59.sys 3840  a90f655ead951908846fd1864eac7e59 
af12dbb04fd09dc38bf04787f9fee62e.sys 3840  af12dbb04fd09dc38bf04787f9fee62e 
1b5a883b7ee98483024b5ab27db55d26.sys 3840  1b5a883b7ee98483024b5ab27db55d26 
19f035eb5281d86c195376b8f0090ab8.sys 3840  19f035eb5281d86c195376b8f0090ab8 
007dbc9fc93a818937a1a229f5c9905a.sys 3840  007dbc9fc93a818937a1a229f5c9905a 
91bc03febafb0187f8d0aa8800c053bd.sys 3840  91bc03febafb0187f8d0aa8800c053bd 
068e0c41ed570a2bbbd30e3bf3bb4fc6.sys 3840  068e0c41ed570a2bbbd30e3bf3bb4fc6 
14e87d6deb26dfb498bdeaf3be54dbf3.sys 3840  14e87d6deb26dfb498bdeaf3be54dbf3 
b187f9c7ea59b87646d8e4c1602578df5756ae4b2a5876099652be050f792e6d.sys 3840  1c31e5bc4696e731dafbd35738738a8d 
269bd077fee8f771fa26c967a741d2dc.sys 3840  269bd077fee8f771fa26c967a741d2dc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware