Home / Spyware Encyclopedia / Rootkit.Small.ayg << Back

Recommendation to Automatically remove Rootkit.Small.ayg


Our products can remove Rootkit.Small.ayg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ayg Details


  • Category Rootkit
  • Discovered 9/1/2012 1:40:24 PM
  • Modified 10/9/2024 3:32:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a90f655ead951908846fd1864eac7e59.sys 3840  a90f655ead951908846fd1864eac7e59 
367c7dced082b3b71f06710ab29de0eee1b92859.sys 3840  fa47cfba04c82fe1a1b2bd05c898f92e 
19f035eb5281d86c195376b8f0090ab8.sys 3840  19f035eb5281d86c195376b8f0090ab8 
91bc03febafb0187f8d0aa8800c053bd.sys 3840  91bc03febafb0187f8d0aa8800c053bd 
068e0c41ed570a2bbbd30e3bf3bb4fc6.sys 3840  068e0c41ed570a2bbbd30e3bf3bb4fc6 
46b1b4bc3bbfd0fb68a407c715704afa243d560857e8b4c0ab7e6fbc63a5dc2d1e9c1304b87e39190bf8c469583ca2aba86.sys 3840  4cff13ac0af5b3dba5b5d689063dd4e0 
865afac49b644aff77a925fc12230741.sys 3840  865afac49b644aff77a925fc12230741 
9e3465a4f37a46a9e80315e46a012a02.sys 3840  9e3465a4f37a46a9e80315e46a012a02 
d584e5457285d9860c4ab15e72efe9a003a32d9d7621ef5cc00d21a5c8a65efa.sys 3840  b44cc8ed3e6942773fb82ffd7cd1be9c 
269bd077fee8f771fa26c967a741d2dc.sys 3840  269bd077fee8f771fa26c967a741d2dc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware