Home / Spyware Encyclopedia / Rootkit.Small.ayg << Back

Recommendation to Automatically remove Rootkit.Small.ayg


Our products can remove Rootkit.Small.ayg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ayg Details


  • Category Rootkit
  • Discovered 9/1/2012 1:40:24 PM
  • Modified 10/9/2024 3:32:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1b5a883b7ee98483024b5ab27db55d26.sys 3840  1b5a883b7ee98483024b5ab27db55d26 
a90f655ead951908846fd1864eac7e59.sys 3840  a90f655ead951908846fd1864eac7e59 
af12dbb04fd09dc38bf04787f9fee62e.sys 3840  af12dbb04fd09dc38bf04787f9fee62e 
367c7dced082b3b71f06710ab29de0eee1b92859.sys 3840  fa47cfba04c82fe1a1b2bd05c898f92e 
19f035eb5281d86c195376b8f0090ab8.sys 3840  19f035eb5281d86c195376b8f0090ab8 
71b134e88db1565b17f342e39218684a.sys 3840  71b134e88db1565b17f342e39218684a 
91bc03febafb0187f8d0aa8800c053bd.sys 3840  91bc03febafb0187f8d0aa8800c053bd 
068e0c41ed570a2bbbd30e3bf3bb4fc6.sys 3840  068e0c41ed570a2bbbd30e3bf3bb4fc6 
46b1b4bc3bbfd0fb68a407c715704afa243d560857e8b4c0ab7e6fbc63a5dc2d1e9c1304b87e39190bf8c469583ca2aba86.sys 3840  4cff13ac0af5b3dba5b5d689063dd4e0 
17315bf4f5a1365e7e1131d82a1a9d6f.sys 3840  17315bf4f5a1365e7e1131d82a1a9d6f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware