Home / Spyware Encyclopedia / Rootkit.Small.sey << Back

Recommendation to Automatically remove Rootkit.Small.sey


Our products can remove Rootkit.Small.sey and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sey Details


  • Category Rootkit
  • Discovered 7/4/2013 10:42:29 PM
  • Modified 8/1/2023 4:14:17 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e45f2d1b16ced4bbaa7fd1f0bf316b36.vir.sys 23552  e45f2d1b16ced4bbaa7fd1f0bf316b36 
ab49c36572e708ad5a1c8234894deefd.vir.sys 23552  ab49c36572e708ad5a1c8234894deefd 
1aaaa0b72ef959da2b42a9e26eb8bd9b.vir.sys 23552  1aaaa0b72ef959da2b42a9e26eb8bd9b 
f3980cefaac152c37b205e7fa6d807d4.vir.sys 23552  f3980cefaac152c37b205e7fa6d807d4 
fd3b9c421561047dcde7ac466556e2bb.vir.sys 23552  fd3b9c421561047dcde7ac466556e2bb 
0f149e5768f64b0e56fe5b5aa6a75e1f.vir.sys 23552  0f149e5768f64b0e56fe5b5aa6a75e1f 
c9a70bcb3e47734ff5efd4ceae41dfcc.vir.sys 23552  c9a70bcb3e47734ff5efd4ceae41dfcc 
3f355637edea75c1b1a94ab9932618cf.vir.sys 23552  3f355637edea75c1b1a94ab9932618cf 
d7fa1c88f3537a416cdd527d3ed23069.vir.sys 23296  d7fa1c88f3537a416cdd527d3ed23069 
ed1e9e27c3d1d07d6a83b990d6d67651.vir.sys 23296  ed1e9e27c3d1d07d6a83b990d6d67651 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware