Home / Spyware Encyclopedia / Rootkit.Small.aap << Back

Recommendation to Automatically remove Rootkit.Small.aap


Our products can remove Rootkit.Small.aap and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.aap Details


  • Category Rootkit
  • Discovered 2/20/2014 1:56:02 AM
  • Modified 7/28/2023 4:05:59 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6ed031ae909eb2fbd27d54e2e1604cf2.dll.exe 22662  6ed031ae909eb2fbd27d54e2e1604cf2 
45ae1407bd899472ed8a250246eecec6d33e5ddb33bc3bf13a8bbb887d254abe.exe 10371  73627daefe209e7a9540a2b3df5fe6d2 
4ccc6e062d1183ef507cda1ce42960c1 10332  4ccc6e062d1183ef507cda1ce42960c1 
a3b5525b0852157621a8d1440c81cbf5.dll.exe 10340  a3b5525b0852157621a8d1440c81cbf5 
1c865fe313e63752104e5493b85406aa.dll.exe 10374  1c865fe313e63752104e5493b85406aa 
cae4bcfb1f609d4368e874cb59967247.dll.exe 21466  cae4bcfb1f609d4368e874cb59967247 
045e6340ef83076438b5c60221cca04a0dbe6ec71141bc32e234601042ed865e.exe 24576  e469d6efd9eeaea87cc0b05ff5945775 
01cfa2efb8dd660c3bf2c6db41a1d99a.vir.exe 24576  01cfa2efb8dd660c3bf2c6db41a1d99a 
181832065621305c6e45ee026c31b7a9aac56a48cbd666093523609754e29739445e7f5bafdaba39abc38b5778cdd.exe 24576  bb41a6d602c2170d6fec63cf7e1d8cda 
b5c0744ff5f6b478b0b43cc99eccdbe8.vir.exe 32256  b5c0744ff5f6b478b0b43cc99eccdbe8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware