Home / Spyware Encyclopedia / Rootkit.Small.a << Back

Recommendation to Automatically remove Rootkit.Small.a


Our products can remove Rootkit.Small.a and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Small.a Details


  • Category Rootkit
  • Discovered 7/31/2017 7:55:38 PM
  • Modified 7/30/2023 5:24:16 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
FCEDD6EA.EXE 4488  4342e1d89b3a27c0f2be8b9132f0996e 
rootkit.win32.small.a 3976  0ce9659f291e71a7ffd4641dc775b582 
e7e8fe98ffa554ceb21a7f6a2c0aa11fb4e65ed8.{ovl}{pe}.exe 4972  984f58f3157c1434c245d183ecdf20f3 
280dc1c8fddeab32a40193a13990d0d8.vir.sys 94572  280dc1c8fddeab32a40193a13990d0d8 
67ca20a0accd12d5a20335da527a429c.vir.exe 650240  67ca20a0accd12d5a20335da527a429c 
4c136e210f56192e846afa12761ba5af.vir.exe 288768  4c136e210f56192e846afa12761ba5af 
virusshare_825f8a8d6651f7e8d0552a5a08522d80.exe 250039  825f8a8d6651f7e8d0552a5a08522d8030/07/2023
3b04fb92a3be3e9b20e2f2f31c26f1fd85a7cf4c125f66370ae1862f5bc66c23.mrg.exe 4315  304f2bea2097ead73de4eabd961b828212/08/2022
sysdirmr.sys 3976  081b032ce87491fdc559f3c23576be3c12/06/2020
7a5d2a182a5d7996372d4e7f220dcec2.vir.sys 27384  7a5d2a182a5d7996372d4e7f220dcec2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware