Home / Spyware Encyclopedia / Rootkit.Small.seg << Back

Recommendation to Automatically remove Rootkit.Small.seg


Our products can remove Rootkit.Small.seg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.seg Details


  • Category Rootkit
  • Discovered 7/9/2013 10:25:23 AM
  • Modified 7/31/2023 5:23:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f7ccb4043ca8688118d7722c7005d8aa.vir.sys 19712  f7ccb4043ca8688118d7722c7005d8aa 
8d6723b33b71af600d0a14a790b88667.vir.sys 19712  8d6723b33b71af600d0a14a790b88667 
a48bb6b6f2a3d3e1c89a55920b327915.vir.sys 19712  a48bb6b6f2a3d3e1c89a55920b327915 
95e5dd005f4808d759190ef769901723.vir.sys 19712  95e5dd005f4808d759190ef769901723 
2bb1a924c59d5d282c537aa7d43c32e8.vir.sys 19968  2bb1a924c59d5d282c537aa7d43c32e8 
04ecaed94a3fbf8cefd98e4773912a13.vir.sys 19712  04ecaed94a3fbf8cefd98e4773912a13 
b2ac37ca2f4ba1ede3236f95f88b3bd7.vir.sys 19712  b2ac37ca2f4ba1ede3236f95f88b3bd7 
b1b45766fa626ad0e729182c5bd552dc.vir.sys 19712  b1b45766fa626ad0e729182c5bd552dc 
ef0d4152113ef989229239380d86997b.vir.sys 36096  ef0d4152113ef989229239380d86997b 
51a1e5b983e3f51e049a9cb520ea6c63.vir.sys 19712  51a1e5b983e3f51e049a9cb520ea6c63 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware