Home / Spyware Encyclopedia / Rootkit.Small.seg << Back

Recommendation to Automatically remove Rootkit.Small.seg


Our products can remove Rootkit.Small.seg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.seg Details


  • Category Rootkit
  • Discovered 7/9/2013 10:25:23 AM
  • Modified 7/31/2023 5:23:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb9a2034a8e9335371a16fcb0697f3d57d45c82754b81809c318415d8a574a74.sys 19712  4bc9d9a75c5367a9795165d356426f83 
6bcb3177d28ec2b2ab0b66885b2d0074.vir.sys 19712  6bcb3177d28ec2b2ab0b66885b2d0074 
190634034322ba414d58d46bfee556057f367c086419cb11b1cca56319ec4f92bf391d02e61100a8c40ba27c5c1ec.sys 19712  ec3d2374120d9f75c16a07b5b511548c 
51627acce348d42ad8305a83220a7aa5.vir.sys 19712  51627acce348d42ad8305a83220a7aa5 
a79d00109c40ade26560b052fc028f18.vir.sys 19712  a79d00109c40ade26560b052fc028f18 
d169c791927a0040077f9a3e1f4eb31b.vir.sys 19712  d169c791927a0040077f9a3e1f4eb31b 
28a47c3131b8d0eff9dab46dfae4e579.vir.sys 19712  28a47c3131b8d0eff9dab46dfae4e579 
15512a3e1c12d6ab3cf8169cfef4db56.vir.sys 19712  15512a3e1c12d6ab3cf8169cfef4db56 
466dab2db916b9904a1bd2e4bc65490d5cb164abba14098097a64ac658c8783a.sys 19712  64646d8d43dfac1000d49a2f8ef30667 
f7ccb4043ca8688118d7722c7005d8aa.vir.sys 19712  f7ccb4043ca8688118d7722c7005d8aa 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware