Home / Spyware Encyclopedia / Rootkit.Small.bbl << Back

Recommendation to Automatically remove Rootkit.Small.bbl


Our products can remove Rootkit.Small.bbl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.bbl Details


  • Category Rootkit
  • Discovered 7/23/2012 12:10:41 PM
  • Modified 4/16/2014 3:24:48 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c3ea81df496ca724ac3e786ac8be923.exe 745472 1.0.0.0e3fd16cc98b2f6d90197964dd2cd9a7b 
339da89d2094c4a4815a897ae59e101a752be575.bin.exe 2510848  e056f20c9b424fc82a9156ee3177db5b 
5ca14599af83d4da54bfa2f18d8d599f6f4acbb809c700f504ff41665628ac8bcda853915f67fa914b41972f2e41d42cfed.exe 757760 1.0.0.0f672cbc1965bd1dcb440b1d4be356b04 
b732b188ac40de124787f99c8ae54dfc.exe 757760 1.0.0.0b732b188ac40de124787f99c8ae54dfc 
11151001566861423834911ec7801d240e58415bf4a780118769af4d871a3ecc1dd4dae46b9a12721734a8e3219d1.exe 786432 1.0.0.0c09ddfb9c4b628f3b35f5bdb87b0a844 
5c42a783493fa823c65a923fb02ba12d.vir.exe 659456 1.0.0.05c42a783493fa823c65a923fb02ba12d 
f7f7f264d36b51120c70ae27ef86fdb5.vir.exe 700416  f7f7f264d36b51120c70ae27ef86fdb5 
bdfd7b85884cdf9713cff2beb309f6e0.vir.exe 368640小烛软件2.3.4.0bdfd7b85884cdf9713cff2beb309f6e0 
751904e514405b138a64937179bf95aa.exe 700416  751904e514405b138a64937179bf95aa 
1ab2fdd868346fdcb7f4a7b8f465b45a.vir.exe 745472 1.0.0.01ab2fdd868346fdcb7f4a7b8f465b45a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware