Home / Spyware Encyclopedia / Rootkit.Agent.l << Back

Recommendation to Automatically remove Rootkit.Agent.l


Our products can remove Rootkit.Agent.l and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.l Details


  • Category Rootkit
  • Discovered 9/27/2011 10:28:43 AM
  • Modified 11/16/2023 11:09:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7549c676.exe 1748242 3.3.0.095a25c19bfbf58d8981c73e9a3fb9b7a 
16badc7adb10cf46f0b70fd8e1f98fdb.sys 160904  16badc7adb10cf46f0b70fd8e1f98fdb 
4ea650019b2cbe99cd9317ef55895e5e.sys 18468  4ea650019b2cbe99cd9317ef55895e5e 
d115baede74c9d90f96a87c3e28de7d2a34a94542626f74ab539f4acbafbfc8a.sys 13707  0ad209c909afb91cccd05bbc9361eea9 
08bea49c000b50047d763827d153a23a596108366bea06bc2043753dad3e19f0.sys 25180  34aa4d6c5e0cb76d41db6bc13c12e1f9 
632f6ccca17e6afe1b9d79e4535bcddb.vir.sys 37700  632f6ccca17e6afe1b9d79e4535bcddb 
fe7b63f55b5ec373ea8daaf03610a703.vir.sys 5376  fe7b63f55b5ec373ea8daaf03610a703 
f5c21bee31435e55afaa77b5644b4513.vir.sys 22348  f5c21bee31435e55afaa77b5644b4513 
8bda1437ae70f85066c664c0cc5e052e.sys 18760  8bda1437ae70f85066c664c0cc5e052e19/06/2020
f6c2096f1383eca05a872178a7ea4bf417d1a87f0728bd29f9401fb8d7146ab6.exe 18844  07e162438178cae20a35214c80ee86af06/07/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware