Home / Spyware Encyclopedia / Rootkit.Agent.gs << Back

Recommendation to Automatically remove Rootkit.Agent.gs


Our products can remove Rootkit.Agent.gs and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.gs Details


  • Category Rootkit
  • Discovered 1/22/2013 9:23:57 PM
  • Modified 10/7/2024 10:15:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d7f5677d31fdf2e7ff014468ad56cae9e26541ff73dbf61920573804729c1ab0.sys 27896  07410e17719ea25201fd7f9d9b2af8a7 
22578ce10f55a618da98c80dbe9a6ffd.sys 27896  22578ce10f55a618da98c80dbe9a6ffd 
54bbb53b28583233779778249fa5ee2638e327f6111f3e018ad20760362116dc.sys 27896  218622934a77e310fde12b9faad8ee01 
5f5f7afa6e4b2e9a72de29526eceafef.sys 27896  5f5f7afa6e4b2e9a72de29526eceafef 
15490803904e4867783ec839f0256f3d2d0cde76482dcaa058fd98ca60c613ff0746d89aff0bbd411878b0563b8d7.sys 27896  96e8bf34267b8de8169c69ed54bd8b01 
0d6a84d9de21dffcf5192dfafc215665.vir.sys 27896  0d6a84d9de21dffcf5192dfafc215665 
9ea467cc1638be9a49315f4e8ba90eb3.vir.sys 27916  9ea467cc1638be9a49315f4e8ba90eb3 
b80f21ce009dfbd056d0526d6c203674.vir.sys 27916  b80f21ce009dfbd056d0526d6c203674 
0cc9d91e976becaaa89b079609985fbd.vir.sys 27896  0cc9d91e976becaaa89b079609985fbd 
3a373ae08eb2667c470cb8a3bbd5e5f0.vir.sys 27896  3a373ae08eb2667c470cb8a3bbd5e5f0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware