Home / Spyware Encyclopedia / Rootkit.Small.a << Back

Recommendation to Automatically remove Rootkit.Small.a


Our products can remove Rootkit.Small.a and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.a Details


  • Category Rootkit
  • Discovered 7/31/2017 7:55:38 PM
  • Modified 7/30/2023 5:24:16 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2716F18F.EXE 3976  db2a218ebb8bfda69f5d5e9a2903347c 
sysdirmr.sys 3976  081b032ce87491fdc559f3c23576be3c 
63076d9e.exe 3976  7cf12afa4075474aa6341d16fcf434c1 
rootkit.win32.small.a 3976  0ce9659f291e71a7ffd4641dc775b582 
e7e8fe98ffa554ceb21a7f6a2c0aa11fb4e65ed8.{ovl}{pe}.exe 4972  984f58f3157c1434c245d183ecdf20f3 
719b7c26f0a05b984766652233f5bf73a90b41006a8757793943a763d5b2cb6e.exe 289792  b04a8ec3153c6af6fa5ebec7c9aab38a 
bb5d5fd4ea7d6ff7e22a5df3478bde97.sys 3976  bb5d5fd4ea7d6ff7e22a5df3478bde97 
41626edd7a81e3178ee6a29c08d11d96.vir.sys 31992  41626edd7a81e3178ee6a29c08d11d96 
280dc1c8fddeab32a40193a13990d0d8.vir.sys 94572  280dc1c8fddeab32a40193a13990d0d8 
19021203540ae14861c9951f91378c03d1330ea83e0f0e76f5c4776fc833bf62d1ee5f3f5469387b446fa16fd1b33.sys 6904  1f937d5256df1a4873de99c92d79f327 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware