Home / Spyware Encyclopedia / Rootkit.Small.sey << Back

Recommendation to Automatically remove Rootkit.Small.sey


Our products can remove Rootkit.Small.sey and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sey Details


  • Category Rootkit
  • Discovered 7/4/2013 10:42:29 PM
  • Modified 8/1/2023 4:14:17 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0f149e5768f64b0e56fe5b5aa6a75e1f.vir.sys 23552  0f149e5768f64b0e56fe5b5aa6a75e1f 
d7fa1c88f3537a416cdd527d3ed23069.vir.sys 23296  d7fa1c88f3537a416cdd527d3ed23069 
be7479ba915845eb824ef616afd29d10.vir.sys 23552  be7479ba915845eb824ef616afd29d10 
654fce423bbf394c15a80ac943de2b5f.vir.sys 23552  654fce423bbf394c15a80ac943de2b5f 
d831d4a8340f3469ccc65264ce96794f.vir.sys 23552  d831d4a8340f3469ccc65264ce96794f 
7bad63a7fbef50ee74d9c4e5a2464839.vir.sys 23552  7bad63a7fbef50ee74d9c4e5a2464839 
27caeb820b64a5b633f053e3678fc6a0.vir.sys 23296  27caeb820b64a5b633f053e3678fc6a0 
b5297525fa636c00933b353e2994f621.vir.sys 23296  b5297525fa636c00933b353e2994f621 
8f92302aa512ba2ba149634c3242bce1.vir.sys 23296  8f92302aa512ba2ba149634c3242bce1 
d29657d74117cc512c73c9bf3e7d8a01.vir.sys 23552  d29657d74117cc512c73c9bf3e7d8a01 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware