Home / Spyware Encyclopedia / Rootkit.Small.ayg << Back

Recommendation to Automatically remove Rootkit.Small.ayg


Our products can remove Rootkit.Small.ayg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ayg Details


  • Category Rootkit
  • Discovered 9/1/2012 1:40:24 PM
  • Modified 10/9/2024 3:32:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
367c7dced082b3b71f06710ab29de0eee1b92859.sys 3840  fa47cfba04c82fe1a1b2bd05c898f92e 
007dbc9fc93a818937a1a229f5c9905a.sys 3840  007dbc9fc93a818937a1a229f5c9905a 
91bc03febafb0187f8d0aa8800c053bd.sys 3840  91bc03febafb0187f8d0aa8800c053bd 
068e0c41ed570a2bbbd30e3bf3bb4fc6.sys 3840  068e0c41ed570a2bbbd30e3bf3bb4fc6 
46b1b4bc3bbfd0fb68a407c715704afa243d560857e8b4c0ab7e6fbc63a5dc2d1e9c1304b87e39190bf8c469583ca2aba86.sys 3840  4cff13ac0af5b3dba5b5d689063dd4e0 
14e87d6deb26dfb498bdeaf3be54dbf3.sys 3840  14e87d6deb26dfb498bdeaf3be54dbf3 
d584e5457285d9860c4ab15e72efe9a003a32d9d7621ef5cc00d21a5c8a65efa.sys 3840  b44cc8ed3e6942773fb82ffd7cd1be9c 
f8c250c7a60181082fb8580934c84dd9.sys 3840  f8c250c7a60181082fb8580934c84dd9 
a8e14c327c5a8ab0eeee7bc36f974cf5.sys 3840  a8e14c327c5a8ab0eeee7bc36f974cf5 
725cd2220c9b351ac7a23e8096ad68e5.sys 3840  725cd2220c9b351ac7a23e8096ad68e5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware