Home / Spyware Encyclopedia / Rootkit.Small.ses << Back

Recommendation to Automatically remove Rootkit.Small.ses


Our products can remove Rootkit.Small.ses and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.ses Details


  • Category Rootkit
  • Discovered 2/5/2016 5:16:14 AM
  • Modified 7/31/2023 5:24:35 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fe462e229c89fc625f5a09a5613071f1.vir.sys 22528  fe462e229c89fc625f5a09a5613071f1 
c241f9bfe0dabeda564acab32d44d76b.vir.sys 22272  c241f9bfe0dabeda564acab32d44d76b 
1e17e8ea8a717c1385b9e2fbaff70ede.vir.sys 22528  1e17e8ea8a717c1385b9e2fbaff70ede 
560e1aa65fefa553aca4d895b318a6dc.vir.sys 22528  560e1aa65fefa553aca4d895b318a6dc 
f2a62ab50b9253253f52e97dc32db515.vir.sys 22272  f2a62ab50b9253253f52e97dc32db515 
5c134d2d3c7274bc57fab5de7e435efb.vir.sys 22272  5c134d2d3c7274bc57fab5de7e435efb 
08aab9a20b3e2041a576f1cc7fff366a.vir.sys 22272  08aab9a20b3e2041a576f1cc7fff366a 
13d874385bfaa462e1814d1c9f070d0d.vir.sys 22528  13d874385bfaa462e1814d1c9f070d0d 
f3f8cc3745bb6cf7ada652f8d0d58f02.vir.sys 22528  f3f8cc3745bb6cf7ada652f8d0d58f02 
2f5c6d68faa211f137c8a89ad92d580b.sys 22272  2f5c6d68faa211f137c8a89ad92d580b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware