Home / Spyware Encyclopedia / Rootkit.TDSS.aheh << Back

Recommendation to Automatically remove Rootkit.TDSS.aheh


Our products can remove Rootkit.TDSS.aheh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.aheh Details


  • Category Rootkit
  • Discovered 8/6/2011 5:37:26 PM
  • Modified 2/13/2024 11:49:07 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d811fc74945b6536f0c34ba6cb3d548d.exe 23040  d811fc74945b6536f0c34ba6cb3d548d 
442abbd50233b41ea91279e6afa9d1e1.sys 23552  442abbd50233b41ea91279e6afa9d1e1 
a1996de9d72b230011b38b95691b1906b8987c33bcd03466760124656dd11997.sys 23552  1f0c307874e3b3d5cec2a3444f7d7b80 
3a0865beffd4fe0c0e5404abf7c87980.sys 23040  3a0865beffd4fe0c0e5404abf7c87980 
834328d972fcc41c621e6abbf47652de566ab94763c5d9ffb1a0bb98f9fa289a.sys 23552  bf06a7ee3df4c866ad0ef7f0d1776fc4 
3adab15fe6cac1eadab1f8bdaa817822.vir.sys 23040  3adab15fe6cac1eadab1f8bdaa817822 
1d55b2f7e50fff6fff74f861829138f6.vir.sys 23040  1d55b2f7e50fff6fff74f861829138f6 
742be3f1179ddd9be8395126217afe7c.vir 23552  742be3f1179ddd9be8395126217afe7c 
6049ee7ecdd5d6a8d5b8bd7f13cf6842.sys 23552  6049ee7ecdd5d6a8d5b8bd7f13cf684211/02/2023
rootkit.win32.tdss.aheh-e69fe86e92c1a77d9b20d4abd72ee48044711fcf6bb8e525f7bef9a39daea1eb.exe 23040  55553782e86c628d2c5eda7de4607bef27/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware