Home / Spyware Encyclopedia / Rootkit.Agent.gk << Back

Recommendation to Automatically remove Rootkit.Agent.gk


Our products can remove Rootkit.Agent.gk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.gk Details


  • Category Rootkit
  • Discovered 10/10/2023 2:58:22 PM
  • Modified 10/10/2023 5:08:56 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4f59e47497c0b9417799abcd6bf1fe846cd36b53186ff87ccfc9983db95dd02a_lanmandrv.sys.exe.sys 5376  c30f71b570532dc44bda7c5b96c65492 
77565177f3f2930619503e88d3c69d47.vir.sys 5376  77565177f3f2930619503e88d3c69d47 
a58f697e8c4fcdc20f1144cbe554d604.sys 5376  a58f697e8c4fcdc20f1144cbe554d60401/05/2020
d979b957d9b84f2acdbb02eb27c95963.vir.exe 25880  d979b957d9b84f2acdbb02eb27c95963 
c8eb2b53327e7792871fdf70cb9d7a73.vir.exe 25880  c8eb2b53327e7792871fdf70cb9d7a73 
c70e5ff2c0b3881a71207895eee83a3a.vir.exe 25880  c70e5ff2c0b3881a71207895eee83a3a 
cb9f3051c6a56b9e952740a1afce1c31.vir.exe 25880  cb9f3051c6a56b9e952740a1afce1c31 
d90cf61e2e37a94c101a616f6b544411.vir.exe 19224  d90cf61e2e37a94c101a616f6b544411 
d824fe851fcb2b6a92f050374933d5c1.vir.exe 19224  d824fe851fcb2b6a92f050374933d5c1 
cfce7ae11b664b2baf89e2dc97588d42.vir.exe 19224  cfce7ae11b664b2baf89e2dc97588d42 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware