Home / Spyware Encyclopedia / Rootkit.Small.sje << Back

Recommendation to Automatically remove Rootkit.Small.sje


Our products can remove Rootkit.Small.sje and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sje Details


  • Category Rootkit
  • Discovered 9/15/2015 4:57:54 AM
  • Modified 10/9/2023 3:50:56 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c4959ad6a59725732a18933ee385811.vir.exe 781346VN13, 12, 11, 25c4959ad6a59725732a18933ee38581109/10/2023
046fc34777c0a0f526a53df0bcb58920.vir.exe 778242VN13, 12, 14, 1046fc34777c0a0f526a53df0bcb5892005/07/2022
1c990f6e69d9e21c7a343b0376a56f11.vir.exe 778298VN13, 12, 14, 21c990f6e69d9e21c7a343b0376a56f1129/04/2022
86930b3f8785e6945b85d6dcf0151541.vir.exe 701472 13, 12, 18, 286930b3f8785e6945b85d6dcf0151541 
078830e2ed928b91c121c87501251211.vir.exe 794624VN13, 12, 14, 2078830e2ed928b91c121c87501251211 
3b04a228cb5c9d67c43291a420e07ca1.vir.exe 779279 13, 12, 10, 33b04a228cb5c9d67c43291a420e07ca1 
046fc34777c0a0f526a53df0bcb58920.vir.exe 778242VN13, 12, 14, 1046fc34777c0a0f526a53df0bcb58920 
5c4959ad6a59725732a18933ee385811.vir.exe 781346VN13, 12, 11, 25c4959ad6a59725732a18933ee385811 
1c990f6e69d9e21c7a343b0376a56f11.vir.exe 778298VN13, 12, 14, 21c990f6e69d9e21c7a343b0376a56f11 
10ac5732e339dd7582dd66ec016a4551.vir.exe 781344VN13, 12, 11, 210ac5732e339dd7582dd66ec016a4551 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware