Home / Spyware Encyclopedia / Rootkit.Small.blb << Back

Recommendation to Automatically remove Rootkit.Small.blb


Our products can remove Rootkit.Small.blb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blb Details


  • Category Rootkit
  • Discovered 5/3/2011 2:18:46 PM
  • Modified 10/11/2024 3:28:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e8d49a7179c452ae896efd18a91adf963a0d6712.{ovl}{pe}.exe 5632  92479e048b40555d056a93ab20bc4165 
clientex.exe 26348  3760a258dc09b1559d2a65f3f5f969a3 
7b8e2e0889a38f2d9751d03b6ce9e39a.vxe.sys 4332  7b8e2e0889a38f2d9751d03b6ce9e39a 
9d6c6a425c16f10508793e51d1374570.sys 141036  9d6c6a425c16f10508793e51d1374570 
d53a78d18089e9c07e7b38d637d1e5a8.exe 26624  ce33b51756a606997186192f460cca4a 
c00bc34a3bd0325833db385b87f97f1b.exe 26348  c00bc34a3bd0325833db385b87f97f1b 
e11ce49eb13382a3d6b5d0b091b2d9a38d35319ec4616d35f108bdd593358e726e8e5ae86f47feb8da644b3c3499d776272.sys 12524  17f821384d7d90090bb88554aca00473 
8f89947705ad51cd6fc5559dc630027c0a7525ad.sys 4332  1ca5b6ce74a57e92fe08247775b92f62 
3e3d361d4ce5c3b97542f5550f374260.exe 26348  3e3d361d4ce5c3b97542f5550f374260 
92431f2f28db3d500e47328b603ca4d5.sys 4332  92431f2f28db3d500e47328b603ca4d5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware