Home / Spyware Encyclopedia / Rootkit.Small.blb << Back

Recommendation to Automatically remove Rootkit.Small.blb


Our products can remove Rootkit.Small.blb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blb Details


  • Category Rootkit
  • Discovered 5/3/2011 2:18:46 PM
  • Modified 10/11/2024 3:28:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e8d49a7179c452ae896efd18a91adf963a0d6712.{ovl}{pe}.exe 5632  92479e048b40555d056a93ab20bc4165 
1f65ecd42927cbf7bcb5e669b87fb1ba.sys 12524  1f65ecd42927cbf7bcb5e669b87fb1ba 
9d6c6a425c16f10508793e51d1374570.sys 141036  9d6c6a425c16f10508793e51d1374570 
d53a78d18089e9c07e7b38d637d1e5a8.exe 26624  ce33b51756a606997186192f460cca4a 
9c8577d793afb7aa9422b1f07975bbdc.vxe.sys 4332  9c8577d793afb7aa9422b1f07975bbdc 
8f89947705ad51cd6fc5559dc630027c0a7525ad.sys 4332  1ca5b6ce74a57e92fe08247775b92f62 
3e3d361d4ce5c3b97542f5550f374260.exe 26348  3e3d361d4ce5c3b97542f5550f374260 
894e70e92595f75c225fb0710585108a0cb0c091df3150c26901996c2965e016989288fbe7bdc43730ccca1b2942385b22b.exe 26348  a5d76760224daca26b48da1d59448727 
0113e73ef36dbce75ba747da1d01a548.exe 22616  0113e73ef36dbce75ba747da1d01a548 
1f43d8f6f7030e0fc30606f933b0c5e3.sys 12524  1f43d8f6f7030e0fc30606f933b0c5e3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware