Home / Spyware Encyclopedia / Rootkit.Small.sey << Back

Recommendation to Automatically remove Rootkit.Small.sey


Our products can remove Rootkit.Small.sey and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sey Details


  • Category Rootkit
  • Discovered 7/4/2013 10:42:29 PM
  • Modified 8/1/2023 4:14:17 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e45f2d1b16ced4bbaa7fd1f0bf316b36.vir.sys 23552  e45f2d1b16ced4bbaa7fd1f0bf316b36 
f3980cefaac152c37b205e7fa6d807d4.vir.sys 23552  f3980cefaac152c37b205e7fa6d807d4 
1aaaa0b72ef959da2b42a9e26eb8bd9b.vir.sys 23552  1aaaa0b72ef959da2b42a9e26eb8bd9b 
0f149e5768f64b0e56fe5b5aa6a75e1f.vir.sys 23552  0f149e5768f64b0e56fe5b5aa6a75e1f 
ed1e9e27c3d1d07d6a83b990d6d67651.vir.sys 23296  ed1e9e27c3d1d07d6a83b990d6d67651 
be7479ba915845eb824ef616afd29d10.vir.sys 23552  be7479ba915845eb824ef616afd29d10 
3ba85920a6a76b80ee9ea8412eefb41a.vir.sys 23552  3ba85920a6a76b80ee9ea8412eefb41a 
654fce423bbf394c15a80ac943de2b5f.vir.sys 23552  654fce423bbf394c15a80ac943de2b5f 
d831d4a8340f3469ccc65264ce96794f.vir.sys 23552  d831d4a8340f3469ccc65264ce96794f 
8c8789b989f86fe095eedd867dd52928.vir.sys 23552  8c8789b989f86fe095eedd867dd52928 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware