Home / Spyware Encyclopedia / Rootkit.Agent.lj << Back

Recommendation to Automatically remove Rootkit.Agent.lj


Our products can remove Rootkit.Agent.lj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.lj Details


  • Category Rootkit
  • Discovered 9/6/2011 12:26:12 AM
  • Modified 8/1/2023 4:13:32 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
10a55bf58e3df01ae1e37f67f898b4da.sys 17280  10a55bf58e3df01ae1e37f67f898b4da 
26cb12f8cd9b435c7d78c69afcedf23a.vir.sys 17280  26cb12f8cd9b435c7d78c69afcedf23a 
952CA61E.EXE 17280  80073a8514497819bfc6cde9eeaf993814/04/2022
6dbd56d924deefcf255ceb7a1568ee4f.sys 17280  6dbd56d924deefcf255ceb7a1568ee4f 
6f03ab317c84e0c8bd43b9a7fe7780b1.vir.sys 17280  6f03ab317c84e0c8bd43b9a7fe7780b1 
001c979491f8bc11b3f7257cd3e6bb1a.vir.sys 17280  001c979491f8bc11b3f7257cd3e6bb1a 
f2822e10b93f93b8efb74bb56ee32f4c.vir.sys 17280  f2822e10b93f93b8efb74bb56ee32f4c 
1c815638942239613c77395efd9ac338.vir.sys 17280  1c815638942239613c77395efd9ac338 
d2b0562cbada99f45e28b462f84113d0a2e70abc.bin.sys 17588  e072aca5a0657bf114f8f0da2658885f 
193544051548fb542b3a1d4aed6a1fb6aca1633416699607536b2e50fcf8af5c519060bf155ab675b93e1ad4c9d9e.sys 17280  98bed2e2a10a1035175ca0c29a95587e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware