Home / Spyware Encyclopedia / Rootkit.Small.blb << Back

Recommendation to Automatically remove Rootkit.Small.blb


Our products can remove Rootkit.Small.blb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blb Details


  • Category Rootkit
  • Discovered 5/3/2011 2:18:46 PM
  • Modified 10/11/2024 3:28:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e8d49a7179c452ae896efd18a91adf963a0d6712.{ovl}{pe}.exe 5632  92479e048b40555d056a93ab20bc4165 
clientex.exe 26348  3760a258dc09b1559d2a65f3f5f969a3 
7b8e2e0889a38f2d9751d03b6ce9e39a.vxe.sys 4332  7b8e2e0889a38f2d9751d03b6ce9e39a 
9c8577d793afb7aa9422b1f07975bbdc.vxe.sys 4332  9c8577d793afb7aa9422b1f07975bbdc 
9d6c6a425c16f10508793e51d1374570.sys 141036  9d6c6a425c16f10508793e51d1374570 
1f65ecd42927cbf7bcb5e669b87fb1ba.sys 12524  1f65ecd42927cbf7bcb5e669b87fb1ba 
8f89947705ad51cd6fc5559dc630027c0a7525ad.sys 4332  1ca5b6ce74a57e92fe08247775b92f62 
3e3d361d4ce5c3b97542f5550f374260.exe 26348  3e3d361d4ce5c3b97542f5550f374260 
92431f2f28db3d500e47328b603ca4d5.sys 4332  92431f2f28db3d500e47328b603ca4d5 
1b81fad1aa4819d1a6e89c66c04a4968079185c6.sys 4332  08068ecf438038b0fc5c283ea1f6114c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware