Home / Spyware Encyclopedia / Rootkit.Small.blb << Back

Recommendation to Automatically remove Rootkit.Small.blb


Our products can remove Rootkit.Small.blb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.blb Details


  • Category Rootkit
  • Discovered 5/3/2011 2:18:46 PM
  • Modified 10/11/2024 3:28:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9c8577d793afb7aa9422b1f07975bbdc.vxe.sys 4332  9c8577d793afb7aa9422b1f07975bbdc 
9d6c6a425c16f10508793e51d1374570.sys 141036  9d6c6a425c16f10508793e51d1374570 
7b8e2e0889a38f2d9751d03b6ce9e39a.vxe.sys 4332  7b8e2e0889a38f2d9751d03b6ce9e39a 
1f65ecd42927cbf7bcb5e669b87fb1ba.sys 12524  1f65ecd42927cbf7bcb5e669b87fb1ba 
e11ce49eb13382a3d6b5d0b091b2d9a38d35319ec4616d35f108bdd593358e726e8e5ae86f47feb8da644b3c3499d776272.sys 12524  17f821384d7d90090bb88554aca00473 
8f89947705ad51cd6fc5559dc630027c0a7525ad.sys 4332  1ca5b6ce74a57e92fe08247775b92f62 
92431f2f28db3d500e47328b603ca4d5.sys 4332  92431f2f28db3d500e47328b603ca4d5 
0113e73ef36dbce75ba747da1d01a548.exe 22616  0113e73ef36dbce75ba747da1d01a548 
fe047078bfb3ea200fb3c3f728ac2a850f05a9b4.exe 349736  08cd191b5cc245d47be6370256f7ff3c 
6c72f460c06edfaf552c7f1fa01179ff.sys 4332  6c72f460c06edfaf552c7f1fa01179ff 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware