Home / Spyware Encyclopedia / Rootkit.Small.blm << Back

Recommendation to Automatically remove Rootkit.Small.blm


Our products can remove Rootkit.Small.blm and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blm Details


  • Category Rootkit
  • Discovered 1/6/2012 12:10:33 AM
  • Modified 2/10/2023 12:18:53 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e6f7e252bb9a7e92385eeaa1fcbfc598.sys 14336  e6f7e252bb9a7e92385eeaa1fcbfc598 
040d33da8491312eb8108a45585732f9.sys 14336  040d33da8491312eb8108a45585732f918/07/2023
878764e1743c2d05b0edd564d7448398.vir.sys 131072  878764e1743c2d05b0edd564d7448398 
738f07f952d38870c4670466b26781ca.vir.sys 131072  738f07f952d38870c4670466b26781ca 
498f9f3bf8d838af7c1640774c5cb2c2.sys 14336  498f9f3bf8d838af7c1640774c5cb2c2 
34bc0901c9f513a0197aceb3345bb06a.sys 14336  34bc0901c9f513a0197aceb3345bb06a 
9d6a623ce679ff9f2465e0939515abf7.sys 14336  9d6a623ce679ff9f2465e0939515abf7 
300f6f43a4a7676033f25a1f5be94d7c.sys 14336  300f6f43a4a7676033f25a1f5be94d7c 
acd3ea69695f290953094a8fb2da0674.sys 14336  acd3ea69695f290953094a8fb2da0674 
040d33da8491312eb8108a45585732f9.sys 14336  040d33da8491312eb8108a45585732f9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware