Home / Spyware Encyclopedia / Rootkit.Small.bbh << Back

Recommendation to Automatically remove Rootkit.Small.bbh


Our products can remove Rootkit.Small.bbh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bbh Details


  • Category Rootkit
  • Discovered 6/14/2010 8:23:47 PM
  • Modified 2/22/2019 11:41:09 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7bb6968e80e3eb18887805d3ac51af04.vir.sys 135234  7bb6968e80e3eb18887805d3ac51af04 
9b9fdcd555087b277202f5cd46aa0c86.sys 11561  9b9fdcd555087b277202f5cd46aa0c86 
fbe39bfa2f770f1de087621aaac293ab.sys 150756  fbe39bfa2f770f1de087621aaac293ab 
3a7e0df1b774cd3bce62b2d477b1c435.exe 60828673ty个人版程序1.0.0.03a7e0df1b774cd3bce62b2d477b1c435 
dbe0611c1daf638905c8411e7f7543e4ad508c7c352b4744b64a0a4dd2625398.sys 214854  23807a4af7df752edd7278d3f6003738 
3.exe 60879873ty个人版程序1.0.0.04439a14bc35700bdfb924885fcac7ede 
718243db40a8e59011fb0ea2c49fcca5050230fb908e330b9f0c4d869fa4b357.sys 160340  1c001a6e9f5acced63e731441ed9651b 
46ca6820729f811e1c255670a9de3f7a0bc7165d.bin.sys 312312  11142df31f56b489c1a1a7e3be61a410 
be4dec0e.exe 9216  7f10a0641a8026669493fc655fd5cd7e 
5af806cf2a1b034ca8b4c7e21e2d5d32dd05b45d4c1258a43475b90b5e6a110e.sys 223443  c372944753da1694ce338a7384be566a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware