Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Bloodhound.ELAM.4

Bloodhound.ELAM.4

Updated:
March 13, 2012
Risk Impact:
High
Systems Affected:
Windows

Behavior

Bloodhound.ELAM.4 is a detection technology designed for the Windows 8 operating system to detect early launching threats such as malicious driver files.

Antivirus Protection Dates

  • Initial Rapid Release version October 02, 2014 revision 022
  • Latest Rapid Release version October 02, 2014 revision 022
  • Initial Daily Certified version February 21, 2012 revision 033
  • Latest Daily Certified version February 21, 2012 revision 033
  • Initial Weekly Certified release date February 22, 2012
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Bloodhound.ELAM.4 is a detection technology designed for the Windows 8 operating system to detect early launching threats such as malicious driver files.

Malicious driver files can take advantage of early loading to begin execution at the start of the boot-up process, even before the operating system itself. Symantec’s Early Launch Anti-Malware (ELAM) technology allows your product to detect these threats and take action against them.

If your product reports this detection, it means there is a malicious driver file on your computer that requires your attention.
You may have arrived at this page either because you have been alerted by your Symantec product about this threat, or you are concerned that your computer has been affected by this threat.


FOR NORTON USERS
If you are a Norton product user, we recommend you try the following resources to remove this threat.

Removal Tool
Run the Norton Boot Recovery Tool

How to reduce the risk of infection
The following resources provide further information and best practices to help reduce the risk of infection.


FOR BUSINESS USERS
If you are a Symantec business product user, we recommend you try the following resources to remove this threat.

Removal Tool
Run the Symantec Endpoint Recovery Tool

How to reduce the risk of infection
The following resource provides further information and best practices to help reduce the risk of infection.
Protecting your business network