Home / Spyware Encyclopedia / Rootkit.Agent.l << Back

Recommendation to Automatically remove Rootkit.Agent.l


Our products can remove Rootkit.Agent.l and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.l Details


  • Category Rootkit
  • Discovered 9/27/2011 10:28:43 AM
  • Modified 11/16/2023 11:09:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
866782d2b8a07f6de9ce4ed1611c5d96a988d4b8.{ovl}{pe}.exe 7976  328b94fd97e017c36b8262726bf394d7 
671834f4c12399c15f345032b85573d93daed16b64600a4565a352c76e1d1217.sys 20388  92fe21d6834187564260edfe43c367f0 
16badc7adb10cf46f0b70fd8e1f98fdb.sys 160904  16badc7adb10cf46f0b70fd8e1f98fdb 
3bad39d3739a2e08c110f80f27370b8b.sys 9488  3bad39d3739a2e08c110f80f27370b8b 
9ca47a17c280fd0c6a6becb814d7f4aa357a20ad216291afbfba1a4ebf87903a.sys 13647  7a22b8cfbb6a3d298d6e390128180e85 
191401b19cca9a07a6f74c70f474e49b.vir.sys 10528  191401b19cca9a07a6f74c70f474e49b 
9282fbc54f3a1d11e485e456206c10d4.vir.sys 10664  9282fbc54f3a1d11e485e456206c10d4 
89699269c6ac03b40d1def81f7833bc0c4be51716ba0c848d9efabc7d5bcc695.sys 22940  388dbd91846646d54c8796228cdb0ea626/06/2020
f6c2096f1383eca05a872178a7ea4bf417d1a87f0728bd29f9401fb8d7146ab6.exe 18844  07e162438178cae20a35214c80ee86af06/07/2020
rootkit.win32.agent.l-80daf0ab983faf3dda24a4d6791192d4504a6c44.exe 17420  69214abf9d6f96f49545150a5585b65a09/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware