Home / Spyware Encyclopedia / Rootkit.Agent.ekta << Back

Recommendation to Automatically remove Rootkit.Agent.ekta


Our products can remove Rootkit.Agent.ekta and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ekta Details


  • Category Rootkit
  • Discovered 8/9/2024 1:21:22 PM
  • Modified 8/12/2024 12:17:29 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
de35ec6ef3012968826327209454f921.sys 254976Windows (R) Win 7 DDK provider6.1.7600.16385 builde35ec6ef3012968826327209454f921 
virusshare_25444b3eb28ff5a52c9c40557b7c7200.sys 86272  25444b3eb28ff5a52c9c40557b7c7200 
e077158086ce31f3c72db615cb4222dd.sys 7394  e077158086ce31f3c72db615cb4222dd 
1059-57902b5e957d820bfd1c72ea245f8b5436841017.exe 80752  5eb196194f4a647d2ad67ade1540489d14/10/2020
0ca9c0c3941cb58203a231be9c6b831b4eb5fad514f3a354d252237447a6aae3.mrg.exe 472576  2496c11f55a26c9ab9f4da9af4085f1413/10/2021
1145a34c681af229fb5d9c2c9cae2527.exe 86272  1145a34c681af229fb5d9c2c9cae252729/04/2022
1eafc6db5e565aa3af0aa82a189a33ab.sys 71680  1eafc6db5e565aa3af0aa82a189a33ab14/05/2022
004a4cc850895a496668453d8254c66479f95c15b99448a7b9147319ea3626d4.exe 316640  21b54226911ff4de83750e79fb30320115/05/2022
0362e06f4cda65a934dba9073617498146eb03b5f70dd25be3da5dc6ef1a7fc7.exe 177152  6394367c9ba899905a4f11809ccd4e8e15/05/2022
482b9dc4e888232cbaf029b965448c96.exe 93752  482b9dc4e888232cbaf029b965448c9620/07/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware