Home / Spyware Encyclopedia / Rootkit.Small.blb << Back

Recommendation to Automatically remove Rootkit.Small.blb


Our products can remove Rootkit.Small.blb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blb Details


  • Category Rootkit
  • Discovered 11/27/2012 9:51:58 PM
  • Modified 1/2/2024 10:35:01 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e8d49a7179c452ae896efd18a91adf963a0d6712.{ovl}{pe}.exe 5632  92479e048b40555d056a93ab20bc4165 
9d6c6a425c16f10508793e51d1374570.sys 141036  9d6c6a425c16f10508793e51d1374570 
8f89947705ad51cd6fc5559dc630027c0a7525ad.sys 4332  1ca5b6ce74a57e92fe08247775b92f62 
92431f2f28db3d500e47328b603ca4d5.sys 4332  92431f2f28db3d500e47328b603ca4d5 
6c72f460c06edfaf552c7f1fa01179ff.sys 4332  6c72f460c06edfaf552c7f1fa01179ff 
f795debabced8e0070d5d9f9c046d025.sys 4332  f795debabced8e0070d5d9f9c046d025 
4e718c186815e817935cc14fdfcff4d7.sys 12524  4e718c186815e817935cc14fdfcff4d7 
2ff3f19b9d851e66d70cd30d8b6eb6f8.exe 26348  2ff3f19b9d851e66d70cd30d8b6eb6f8 
5028c0636eef221c21e1f7b003216ca4.sys 4332  5028c0636eef221c21e1f7b003216ca4 
7149d41e09d23d12693865b976ecb273.sys 4332  7149d41e09d23d12693865b976ecb273 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware