Home / Spyware Encyclopedia / Rootkit.Agent.ge << Back

Recommendation to Automatically remove Rootkit.Agent.ge


Our products can remove Rootkit.Agent.ge and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ge Details


  • Category Rootkit
  • Discovered 7/16/2011 8:12:18 PM
  • Modified 2/22/2019 11:57:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
14d4c4be138fab94aad2469021e15298.vir.sys 35658  14d4c4be138fab94aad2469021e15298 
29dd474baf6731f3c7204690190dfd09.vir.sys 6265  29dd474baf6731f3c7204690190dfd09 
28886f5cc35fe51b71bdddab0b2a875aab616f68561bfa153a9b53521b430bf6.sys 11385  dc03992505cac5be4ed24f46dd9c502e 
598af1b413305856f168c4d1977883a8758c1da262e3672b4b06f2cedc49d808.sys 5353  d887a391e5f96ebf5df716368d8307c9 
ceaae2418d66e88247ede553be2c1a214d3ed1b9d1db9a8a6934a13ae64f0b0a.sys 5376  65a28d7a8424b11cbbe1a747f3535af9 
162551039942736c4df09c4f748f52e7f23a0ef5aefb86d0dd4ce18921f9f49fbb10ffbd6e0d731884a2a78c85c11.sys 6265  708e9fe65b9f25c6c2f1702ab9ef3c92 
70edc34945944d1b75110eb7880149cb.sys 30265  70edc34945944d1b75110eb7880149cb 
4c8ef71795b3a535e4d1eb4655badd57.sys 11385  4c8ef71795b3a535e4d1eb4655badd57 
14f781c26b20c711cee4c6fa0a2052d6ef55c60a.bin.sys 11385  15d7dd84b8df3275081ea49367cc58f5 
2db05377ed97180852cb5b4d3d7aec22fae60e0fdefd4819c93ff8785d75d5a4.sys 6265  f8dd7f08b60fc922902082e4b5094044 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware