Home / Spyware Encyclopedia / Rootkit.Agent.llg << Back

Recommendation to Automatically remove Rootkit.Agent.llg


Our products can remove Rootkit.Agent.llg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.llg Details


  • Category Rootkit
  • Discovered 6/21/2011 8:23:22 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d5f71dc482470265750854ed3a020872.exe 48128  d5f71dc482470265750854ed3a020872 
7159d4b29c652930f7383a2ef985b342.dll.exe 48128  7159d4b29c652930f7383a2ef985b342 
cae570b3b3558e4e1cde5cb77e66f0e6873dccce4d8bdcea07e107c01c0969f3.exe 48128  9a4f4bbeb98abd1b42b651392971d36c 
34cfa1a9a72605af5ecb961186e25b905a50db3eab504c97d683b2eae1772f78.exe 48128  f7755300a5edf6ad762de47105db0f44 
5c5cca14bba67c70b444f1b2e57a3fb3.dll.exe 48128  5c5cca14bba67c70b444f1b2e57a3fb3 
8372613052b51d56165af85b59a57e583cde75077358a48f15df3352b25fd70acc518dfbd64d95b1f57a7e28af97f56aa2c.exe 48128  3edbcbe715888e26b61db154edccfd7e 
3573b57924f217b73f6f4f4df9aa4023.exe 48128  3573b57924f217b73f6f4f4df9aa4023 
3b7422ffb8d06cae78417913a72468ba.dll.exe 48128  3b7422ffb8d06cae78417913a72468ba 
161ca517e0f5e598db971127bda89b44.dll.exe 48128  161ca517e0f5e598db971127bda89b44 
9092da509ec68691d2abed2857768c0e.dll.exe 48128  9092da509ec68691d2abed2857768c0e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware