Home / Spyware Encyclopedia / Rootkit.Small.seg << Back

Recommendation to Automatically remove Rootkit.Small.seg


Our products can remove Rootkit.Small.seg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.seg Details


  • Category Rootkit
  • Discovered 7/9/2013 10:25:23 AM
  • Modified 7/31/2023 5:23:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb9a2034a8e9335371a16fcb0697f3d57d45c82754b81809c318415d8a574a74.sys 19712  4bc9d9a75c5367a9795165d356426f83 
6bcb3177d28ec2b2ab0b66885b2d0074.vir.sys 19712  6bcb3177d28ec2b2ab0b66885b2d0074 
a097eb0da1b6e3fdc6e9a7bf821a2cb4.vir.sys 19712  a097eb0da1b6e3fdc6e9a7bf821a2cb4 
c012af066a9dbdd7f15a76dc2aa25d07f5a0bcd4f3c9c894793743e6f303d652.sys 19712  ac3856a75842ca1ef8e9c9a404e544d8 
a79d00109c40ade26560b052fc028f18.vir.sys 19712  a79d00109c40ade26560b052fc028f18 
466dab2db916b9904a1bd2e4bc65490d5cb164abba14098097a64ac658c8783a.sys 19712  64646d8d43dfac1000d49a2f8ef30667 
59b46bb036def402f41d1e5e2b4807d677e026ee3550dbe3ffaa6b1d02aee1e9.sys 19712  7651ad8e24b01b7131d2df2348dbce39 
11edd3bd056aa9d087257140f16252f6.vir.sys 19712  11edd3bd056aa9d087257140f16252f6 
2dee19d76fb7e2444bfc7408938bbf7e.vir.sys 19712  2dee19d76fb7e2444bfc7408938bbf7e 
1c47bf2123013beaa6e8a9f09cf2cea1.vir.sys 19712  1c47bf2123013beaa6e8a9f09cf2cea1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware