Home / Spyware Encyclopedia / Rootkit.Small.sei << Back

Recommendation to Automatically remove Rootkit.Small.sei


Our products can remove Rootkit.Small.sei and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.sei Details


  • Category Rootkit
  • Discovered 5/22/2013 10:06:07 PM
  • Modified 7/31/2023 5:22:59 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
663db9e648860b543ee7c2bba3647d2ce1f2b45cadce0638a87e83cb6822888e.sys 20352  258368982a6caa1bf7f1bce71acfd573 
238dbcf71c8e68131ca6ef553b4434e6.sys 20352  238dbcf71c8e68131ca6ef553b4434e6 
acfed4faced3809db71026bbc0889563e9b6803a7fffd71aa2dda78c01da0cef.sys 20352  53dc37cd8989bd884f26bd68aabf3990 
d0e444c3bdbadaf72f074ea1734c003d4b1105a36074df28deedf66ee1a81ed4.sys 20352  2098802a8912e347ed24c74bcff1f879 
137b8198acc935794bcee06a31449173736159d6e145c7b90031f4c32153ed0d.sys 20352  3bc4b87dec0e64e5eac3a5e9db149e12 
c24f2a9103aedbad3a45c7ba85d02dfd3b957412425dd14405ea0c1c656cb437.sys 20352  91add4eb2d693af61170a7ebf197c623 
903e7aa096134385781d7f8ab14126d1c2fdd236d4e35cb2ac86633905ddf211.sys 20608  9abcefed97420eac59686c820474a6f8 
8f183bc436ea13bb1a422c2abd1b6192.vir.sys 20608  8f183bc436ea13bb1a422c2abd1b6192 
3b73b446826ee5c5862715164ebd82fe.vir.sys 20608  3b73b446826ee5c5862715164ebd82fe 
2b33635f62c37b5873cb8885d24548a6.vir.sys 20352  2b33635f62c37b5873cb8885d24548a6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware