Home / Spyware Encyclopedia / Rootkit.Agent.gty << Back

Recommendation to Automatically remove Rootkit.Agent.gty


Our products can remove Rootkit.Agent.gty and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.gty Details


  • Category Rootkit
  • Discovered 1/11/2013 7:57:19 AM
  • Modified 5/17/2013 6:08:52 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9dc6a119be425c9f1369435e1a9e9110.exe 1130496  9dc6a119be425c9f1369435e1a9e9110 
cf15da3263b81dc3aad6ac6351c08788.exe 1130496  cf15da3263b81dc3aad6ac6351c08788 
90d91310144121ec079c7dd2d2da869c.exe 1122304  90d91310144121ec079c7dd2d2da869c 
a465e614ff962fd53cb4917aad0e9c66.exe 1130496  a465e614ff962fd53cb4917aad0e9c66 
1544100478520c741052751ed81e7e9b8a76fc30092170298f48a6e105105e677bcfc467c5eb24373c5d3868bb9eb.exe 2184192  d8400efc8834b361d63505fc12fc4f5b 
733786866a4fa836efca4b8a9b047121358164cf3086e027374f556b7fd1a218.exe 1122304  d3418eb41a0bbe8862675cbd854197ba 
d2ea2f8cc7039e7f970046ff5a43261c.exe 1122304  d2ea2f8cc7039e7f970046ff5a43261c 
83f5abe1388b4e5ae87572cb9d2d9170.exe 1122304  83f5abe1388b4e5ae87572cb9d2d9170 
1626040146170a6cca0e1d33f674769dea09b80ca82b66f690d3b335964018101cdf7794d439c06abed0b9d82f137.exe 2176020  e287723df51f3cb2b995473bd4b7896a 
1454210134073c510b06e51c842bc70833da3ce9d5bc0b58b34bd09679b94c3928f83d53d2bfbbe3649b7e4d23e82.exe 1122304  e79e55091412ea17d9730c64b7a1a75e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware