Home / Spyware Encyclopedia / Rootkit.Small.sez << Back

Recommendation to Automatically remove Rootkit.Small.sez


Our products can remove Rootkit.Small.sez and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sez Details


  • Category Rootkit
  • Discovered 9/23/2013 8:07:52 PM
  • Modified 7/31/2023 5:23:10 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e306ace81b4a9c372b4794d16a75a79b.vir.sys 23552  e306ace81b4a9c372b4794d16a75a79b 
4bebbbb169d11cb3c1e417a7f9d3a7a3.vir.sys 23552  4bebbbb169d11cb3c1e417a7f9d3a7a3 
0a54fcd6973f4faf298875497b2cabe4.vir.sys 23552  0a54fcd6973f4faf298875497b2cabe4 
cdfc96c7773fecd67e7aaee4a6c1e2fb.vir.sys 23552  cdfc96c7773fecd67e7aaee4a6c1e2fb 
106ff41ec27e5d370d181f3267ac40bf.vir.sys 23552  106ff41ec27e5d370d181f3267ac40bf 
f6dc5ffe7c85e9dcad3fc256fab4af25.vir.sys 23552  f6dc5ffe7c85e9dcad3fc256fab4af25 
eeaed757f83cf17c9ac6ab1b865eb2aa.vir.sys 23552  eeaed757f83cf17c9ac6ab1b865eb2aa 
d015b516b2d852504c338b8ab0875ff2.vir.sys 23552  d015b516b2d852504c338b8ab0875ff2 
ca4b1581f65df5220c7dbbac7f92d957.vir.sys 23552  ca4b1581f65df5220c7dbbac7f92d957 
a378c8db90cd52ca62d766e1ea89c7d1.vir.sys 23552  a378c8db90cd52ca62d766e1ea89c7d1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware