Home / Spyware Encyclopedia / Rootkit.Agent.el << Back

Recommendation to Automatically remove Rootkit.Agent.el


Our products can remove Rootkit.Agent.el and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.el Details


  • Category Rootkit
  • Discovered 8/8/2023 1:54:44 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
main.sys 28544  7e65bdec8a981316f5df550ae4c706ef 
bc3c7d81e1494130c747e9486802ce13_main.sys.exe.sys 28544  fe405b90100c6fb6dbd4dcb1868b25c5 
9b088b5f891f82d314a5d0fc31e0ed8394df2e5f9145c86e4d33d9f7dbc9023f.sys 36224  052e10f7bc6c9e9fda2888d504a1665a 
5004d867d59dc301ec719b1d59664bff.sys 29568  5004d867d59dc301ec719b1d59664bff 
rootkit.win32.agent.el_1.d87e70da3b15752d1e44eb227f9fef8b.exe 36224  d87e70da3b15752d1e44eb227f9fef8b05/09/2020
rootkit.win32.agent.el-a2eb2af737a19f3f61d1138de7ca5772352045a7.exe 36224  54c35cadfc740fcfc601644a02a62ff809/08/2023
f9cabbf388607425dc36c724641c2df7.vir.sys 28544  f9cabbf388607425dc36c724641c2df7 
5a61cf530651f592dced92fd96dda3de.sys 28544  5a61cf530651f592dced92fd96dda3de 
1c53ee239450b2621be9baa83b8d6fe72552bc3cdc745670b0ccd923684f83be.sys 36224  185a458e96a98861d9511230075ffd51 
22947455f7ef27d503f8edcb2e08e335.sys 37760  22947455f7ef27d503f8edcb2e08e335 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware