Home / Spyware Encyclopedia / Rootkit.Kabliner.ax << Back

Recommendation to Automatically remove Rootkit.Kabliner.ax


Our products can remove Rootkit.Kabliner.ax and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Kabliner.ax Details


  • Category Rootkit
  • Discovered 7/5/2013 3:04:37 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2e46f58bb3d34b6aae808db33b5fef20.vir.sys 34816  2e46f58bb3d34b6aae808db33b5fef20 
31ab15c3fc9a1509773ad4413d93b421.vir.sys 34816  31ab15c3fc9a1509773ad4413d93b42109/08/2023
rootkit.win32.kabliner.ax-ddb42cb4e3d1e920afe07ea52cd794f2383e50d9.exe 34816  ef53bc6e4368c9f314d49c880a40aacc09/08/2023
c0170ce94ce6f1e6e716268791048c68b9b33959e23fed3b89c4a76e9d80f727.sys 34816  462a4a1563b7900941cfc5a4ebdeb04303/08/2023
rootkit.win32.kabliner.aq.7691e0068813badd6e3b472e97acd4db.exe 34816  7691e0068813badd6e3b472e97acd4db12/06/2020
9e56277036a36adbd787f13983a91ed1.vir.sys 34816  9e56277036a36adbd787f13983a91ed1 
31ab15c3fc9a1509773ad4413d93b421.vir.sys 34816  31ab15c3fc9a1509773ad4413d93b421 
79e3d05630b5b961360588343b0a99f961a1ad2e521053494f36fc0187b83d7b.sys 34816  19de2c9d2db6bbea61834d166a47f935 
0ce80ab585268216edaa7c763051dea6bbf1c8e60d14829f0bad15325837ffcf.sys 34816  68f07f1ad1705c7e8b530972a3894d3a 
947fa97a852ffe9a703b10bae444ce17.sys 34816  947fa97a852ffe9a703b10bae444ce17 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware