Home / Spyware Encyclopedia / Rootkit.Agent.grg << Back

Recommendation to Automatically remove Rootkit.Agent.grg


Our products can remove Rootkit.Agent.grg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.grg Details


  • Category Rootkit
  • Discovered 4/21/2011 4:18:39 PM
  • Modified 4/29/2021 6:03:28 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.grg 22144  368542e41059bccbab79da79f8dab37c 
f8fc3c01ee8bd6189b3bd7913cc431df.vir.sys 22144  f8fc3c01ee8bd6189b3bd7913cc431df 
7c31a45e5c768f0ed0eb498dc5078553.vir.sys 22144  7c31a45e5c768f0ed0eb498dc5078553 
3d90caa308234d90dd5814107b5f5ac66c69076e373a7649680b63f8f2c8bf10.sys 22144  fd23533b29065b441182d92986635d7d18/07/2023
0a986926863ceda434c24824f7f26e0e.vir.sys 22144  0a986926863ceda434c24824f7f26e0e 
306bb0f652610665c759b3e339b96ddc.vir.sys 22144  306bb0f652610665c759b3e339b96ddc 
1550200875730e4bc64e37543c519d43f62fd5133dae786a647a5c2a441d066e42df4db45d97e15b5bde8cf985e42.sys 22144  87a20cb5e84793ead948edc03dd3f03e 
07fd1f03354370116199bc105007f066.sys 22144  07fd1f03354370116199bc105007f066 
bb2bfba930cf4ba7e2a67fddd5c6724172bdf174f9a92e1952df0e2c3c3e48a5.sys 22144  438a994ca9af095b7d86666781ef80ed 
7774e660acf5520cb8be7a521819d9ce.sys 22144  7774e660acf5520cb8be7a521819d9ce 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware