Home / Spyware Encyclopedia / Rootkit.Small.seg << Back

Recommendation to Automatically remove Rootkit.Small.seg


Our products can remove Rootkit.Small.seg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.seg Details


  • Category Rootkit
  • Discovered 7/9/2013 10:25:23 AM
  • Modified 7/31/2023 5:23:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb9a2034a8e9335371a16fcb0697f3d57d45c82754b81809c318415d8a574a74.sys 19712  4bc9d9a75c5367a9795165d356426f83 
a097eb0da1b6e3fdc6e9a7bf821a2cb4.vir.sys 19712  a097eb0da1b6e3fdc6e9a7bf821a2cb4 
a79d00109c40ade26560b052fc028f18.vir.sys 19712  a79d00109c40ade26560b052fc028f18 
2dee19d76fb7e2444bfc7408938bbf7e.vir.sys 19712  2dee19d76fb7e2444bfc7408938bbf7e 
200041051546907f1999e353c4c325c4c42845f16e95a54f00c1d869dc201c786e0752279936b09b78ba1ac7883d2.sys 19968  e486ef9996e0217267a90fd0eea75798 
5a417bdad26301e427d02deda9d46768.vir.sys 19968  5a417bdad26301e427d02deda9d46768 
4534a411485cad86f80c2613011319fa.vir.sys 19712  4534a411485cad86f80c2613011319fa 
d7a9027fad6255f59642733e2c8951b2.vir.sys 19712  d7a9027fad6255f59642733e2c8951b2 
b3612f46daa4053a8b276e282d356c61.vir.sys 19712  b3612f46daa4053a8b276e282d356c61 
1e4b07f82b7240cda63209d3a96c6375.vir.sys 19712  1e4b07f82b7240cda63209d3a96c6375 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware