Home / Spyware Encyclopedia / Rootkit.Agent.gs << Back

Recommendation to Automatically remove Rootkit.Agent.gs


Our products can remove Rootkit.Agent.gs and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.gs Details


  • Category Rootkit
  • Discovered 1/22/2013 9:23:57 PM
  • Modified 10/7/2024 10:15:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d7f5677d31fdf2e7ff014468ad56cae9e26541ff73dbf61920573804729c1ab0.sys 27896  07410e17719ea25201fd7f9d9b2af8a7 
06a1ba241e4581cd100861a679c82fab.sys 27896  06a1ba241e4581cd100861a679c82fab 
54bbb53b28583233779778249fa5ee2638e327f6111f3e018ad20760362116dc.sys 27896  218622934a77e310fde12b9faad8ee01 
15490803904e4867783ec839f0256f3d2d0cde76482dcaa058fd98ca60c613ff0746d89aff0bbd411878b0563b8d7.sys 27896  96e8bf34267b8de8169c69ed54bd8b01 
e91de661bab6ff22ff5e751f64e678dfa2feb386.bin.sys 27896  01c9c103106e1c80aa6198b03b745cb9 
3e61d94e9960702fc8981a1b429083a274b31930.bin.sys 27896  0e526e4c7d559bc2ed1fc5fe87bc9452 
1048b087d4123b7be433787b5fcd31484bfefc7d3545201046bcff74fb9dc065.sys 27916  0976bb89d5014fce1146dd33cfd15fde 
9d31f06733b9bd20b4488be6d139b8f2.vir.sys 27896  9d31f06733b9bd20b4488be6d139b8f2 
b80f21ce009dfbd056d0526d6c203674.vir.sys 27916  b80f21ce009dfbd056d0526d6c203674 
4259c01a03b52f3550a681a04f940e79.exe 25880  4259c01a03b52f3550a681a04f940e79 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware