Home / Spyware Encyclopedia / Rootkit.Agent.l << Back

Recommendation to Automatically remove Rootkit.Agent.l


Our products can remove Rootkit.Agent.l and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.l Details


  • Category Rootkit
  • Discovered 9/27/2011 10:28:43 AM
  • Modified 11/16/2023 11:09:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
866782d2b8a07f6de9ce4ed1611c5d96a988d4b8.{ovl}{pe}.exe 7976  328b94fd97e017c36b8262726bf394d7 
697be722d115b3e39f7528d448f6a57e1e54392b.{ovl}{pe}.exe 9332  f42ca21a1824799f5a9cb90f20c69d22 
22c8e82a9710b8eb6956b6ee751c2986.sys 6656  22c8e82a9710b8eb6956b6ee751c2986 
16badc7adb10cf46f0b70fd8e1f98fdb.sys 160904  16badc7adb10cf46f0b70fd8e1f98fdb 
193557070328970094a6882250d3ddd5123fa0e6e54ca04d825acfb4358cad1e565c1d6b1ad829a2fe461003e2317.exe 241708 1.0.0.89accd1ac4745f2fa72e663534c8d4ef4 
8bda1437ae70f85066c664c0cc5e052e.sys 18760  8bda1437ae70f85066c664c0cc5e052e 
89699269c6ac03b40d1def81f7833bc0c4be51716ba0c848d9efabc7d5bcc695.sys 22940  388dbd91846646d54c8796228cdb0ea6 
b1686820ab1b4906e7947fbbd95a2b79.sys 6656  b1686820ab1b4906e7947fbbd95a2b79 
3bad39d3739a2e08c110f80f27370b8b.sys 9488  3bad39d3739a2e08c110f80f27370b8b 
d115baede74c9d90f96a87c3e28de7d2a34a94542626f74ab539f4acbafbfc8a.sys 13707  0ad209c909afb91cccd05bbc9361eea9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware