Home / Spyware Encyclopedia / Rootkit.Tiny.jg << Back

Recommendation to Automatically remove Rootkit.Tiny.jg


Our products can remove Rootkit.Tiny.jg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Tiny.jg Details


  • Category Rootkit
  • Discovered 2/21/2012 12:30:42 PM
  • Modified 5/19/2020 1:36:49 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
990557368dfdb13ef0c4c9e9d40ff2bf.vxe.exe 34816AhnLab, Inc.1, 0, 1, 2990557368dfdb13ef0c4c9e9d40ff2bf 
51bdd7b571870025c7ef625f4ce64192.vxe.exe 35328AhnLab, Inc.1, 0, 0, 551bdd7b571870025c7ef625f4ce64192 
dc892379f50f1080388f96e595787f64.exe 34816AhnLab, Inc.1, 0, 1, 2dc892379f50f1080388f96e595787f64 
fbbacb57071795cb7d0dd67a2426991c.exe 34816AhnLab, Inc.1, 0, 0, 5fbbacb57071795cb7d0dd67a2426991c 
1483097_yg.exe 34816AhnLab, Inc.1, 0, 1, 2f8f649ce63e7c09bcb8b83228af4be66 
8b8abff40ed5eb1ad1d07d31f9dfbb7a.DLL.exe 37965Microsoft Corporation5.1.2600.5512 (xpsp8b8abff40ed5eb1ad1d07d31f9dfbb7a 
a0b32c8e5edcad45fb708862a0eae429.exe 37909Microsoft Corporation5.1.2600.5512 (xpspa0b32c8e5edcad45fb708862a0eae429 
72c21bc76d83180ddd0bafd89ac53303.sy#.sys 4096  72c21bc76d83180ddd0bafd89ac53303 
2d972c53dabb335704c7096c8c07c3a7.exe 126976  2d972c53dabb335704c7096c8c07c3a7 
555cc073c3f10281f15947936ad281f7.exe 126976  555cc073c3f10281f15947936ad281f7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware