Home / Spyware Encyclopedia / Rootkit.Small.ayg << Back

Recommendation to Automatically remove Rootkit.Small.ayg


Our products can remove Rootkit.Small.ayg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ayg Details


  • Category Rootkit
  • Discovered 4/5/2024 1:55:13 AM
  • Modified 4/5/2024 11:41:03 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1b5a883b7ee98483024b5ab27db55d26.sys 3840  1b5a883b7ee98483024b5ab27db55d26 
367c7dced082b3b71f06710ab29de0eee1b92859.sys 3840  fa47cfba04c82fe1a1b2bd05c898f92e 
9e3465a4f37a46a9e80315e46a012a02.sys 3840  9e3465a4f37a46a9e80315e46a012a02 
14e87d6deb26dfb498bdeaf3be54dbf3.sys 3840  14e87d6deb26dfb498bdeaf3be54dbf3 
73badd8dfc0f0a9e2a973d1024108c4f.sys 3840  73badd8dfc0f0a9e2a973d1024108c4f 
7891b62d0a26ba3def03345d96a72a85.sys 3840  7891b62d0a26ba3def03345d96a72a85 
d451cf75906bb4c0a3dd577c4ce808ddbf8755a9c3303ff71c14051b6ec6700d.sys 3840  f0890ec41e07ce111c422411ee96a260 
1d71d4e751e147c99952a290a516a5ba48426cfb1d002bf86c0cafd5142db70fd868ed29ed65d4744485fbabd8408a298fa.sys 3840  edc38485149b1f41dd45d628fc72fe21 
56168f09e75037ae1bf7e465a0d60a93.sys 3840  56168f09e75037ae1bf7e465a0d60a93 
9cf212a6b9b5c40fe097c35f367aa0d6.sys 3840  9cf212a6b9b5c40fe097c35f367aa0d6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware