Home / Spyware Encyclopedia / Rootkit.Small.seg << Back

Recommendation to Automatically remove Rootkit.Small.seg


Our products can remove Rootkit.Small.seg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.seg Details


  • Category Rootkit
  • Discovered 7/9/2013 10:25:23 AM
  • Modified 7/31/2023 5:23:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7eb1c762c28bf3cd22d504bb1ebf2650.vir.sys 19968  7eb1c762c28bf3cd22d504bb1ebf2650 
ef0d4152113ef989229239380d86997b.vir.sys 36096  ef0d4152113ef989229239380d86997b 
47d8a23596930d78d7f092ca4e87eeed.vir.sys 19712  47d8a23596930d78d7f092ca4e87eeed 
11ee91f8689806f15f48a06f5e4934d7.vir.sys 19968  11ee91f8689806f15f48a06f5e4934d7 
259b665078288ea95a367b15ed5cf68e.vir.sys 19968  259b665078288ea95a367b15ed5cf68e 
e7540bbcb3021c83743096ebd8ae1bdb.vir.sys 19712  e7540bbcb3021c83743096ebd8ae1bdb 
0d46d36ffd47b78609634b5e157ac773.vir.sys 19968  0d46d36ffd47b78609634b5e157ac773 
aaf867e5bd7fa1737aa99e0180a5b919.vir.sys 19968  aaf867e5bd7fa1737aa99e0180a5b919 
791f2fa3ca0d571a66fee81429a839d1.vir.sys 19712  791f2fa3ca0d571a66fee81429a839d1 
ee788c22000c7001089521859f3e48d2.vir.sys 19712  ee788c22000c7001089521859f3e48d2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware