Home / Spyware Encyclopedia / Rootkit.Small.a << Back

Recommendation to Automatically remove Rootkit.Small.a


Our products can remove Rootkit.Small.a and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.a Details


  • Category Rootkit
  • Discovered 7/31/2017 7:55:38 PM
  • Modified 7/30/2023 5:24:16 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2716F18F.EXE 3976  db2a218ebb8bfda69f5d5e9a2903347c 
sysdirmr.sys 3976  081b032ce87491fdc559f3c23576be3c 
280dc1c8fddeab32a40193a13990d0d8.vir.sys 94572  280dc1c8fddeab32a40193a13990d0d8 
e528ee30a3779f70a03dd9d0462f8f92.vir.sys 3672  e528ee30a3779f70a03dd9d0462f8f92 
0c62ac3b84a9b7b119e051bc17a8b341.vir.sys 160620  0c62ac3b84a9b7b119e051bc17a8b341 
sysdirmr.sys 3976  081b032ce87491fdc559f3c23576be3c12/06/2020
virusshare_825f8a8d6651f7e8d0552a5a08522d80.exe 250039  825f8a8d6651f7e8d0552a5a08522d8030/07/2023
3b04fb92a3be3e9b20e2f2f31c26f1fd85a7cf4c125f66370ae1862f5bc66c23.mrg.exe 4315  304f2bea2097ead73de4eabd961b828212/08/2022
7a5d2a182a5d7996372d4e7f220dcec2.vir.sys 27384  7a5d2a182a5d7996372d4e7f220dcec2 
291a8fd729cd9f41b42a27ceb3fcea7a.vir.exe 1028101  291a8fd729cd9f41b42a27ceb3fcea7a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware