Home / Spyware Encyclopedia / Rootkit.Small.bbl << Back

Recommendation to Automatically remove Rootkit.Small.bbl


Our products can remove Rootkit.Small.bbl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bbl Details


  • Category Rootkit
  • Discovered 7/23/2012 12:10:41 PM
  • Modified 4/16/2014 3:24:48 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b732b188ac40de124787f99c8ae54dfc.exe 757760 1.0.0.0b732b188ac40de124787f99c8ae54dfc 
bdfd7b85884cdf9713cff2beb309f6e0.vir.exe 368640小烛软件2.3.4.0bdfd7b85884cdf9713cff2beb309f6e0 
751904e514405b138a64937179bf95aa.exe 700416  751904e514405b138a64937179bf95aa 
5c42a783493fa823c65a923fb02ba12d.vir.exe 659456 1.0.0.05c42a783493fa823c65a923fb02ba12d 
1ab2fdd868346fdcb7f4a7b8f465b45a.vir.exe 745472 1.0.0.01ab2fdd868346fdcb7f4a7b8f465b45a 
6a19c940e01833e3a5895dea8951e8cb.vir.exe 839680 1.0.0.06a19c940e01833e3a5895dea8951e8cb 
7f5c1cb32d28a4140417ecc990820b70.exe 283648 1.0.0.07f5c1cb32d28a4140417ecc990820b70 
11151001566861423834911ec7801d240e58415bf4a780118769af4d871a3ecc1dd4dae46b9a12721734a8e3219d1.exe 786432 1.0.0.0c09ddfb9c4b628f3b35f5bdb87b0a844 
9a23205f1b54bdadf318d081588d3087.exe 757760 1.0.0.09a23205f1b54bdadf318d081588d3087 
a1c0c936bbd5af03fa34998c2155709d.exe 626688 1.0.0.0a1c0c936bbd5af03fa34998c2155709d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware