Home / Spyware Encyclopedia / Rootkit.Agent.f << Back

Recommendation to Automatically remove Rootkit.Agent.f


Our products can remove Rootkit.Agent.f and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.f Details


  • Category Rootkit
  • Discovered 1/22/2010 10:49:35 PM
  • Modified 8/8/2022 1:35:29 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e1d7904e.exe 2560  5929852c2e65a35c795c5303e5ed3a94 
04b683fdb76b866ba715cd4042ec2e05 27443  04b683fdb76b866ba715cd4042ec2e05 
566cae507e1e70c644824cdbe553f5d157cd93e35427760d415cb9a733c72cd9 64312  549b586938a086f1e3347dd2f707be45 
e2f7e3af6bb0ac0c7dfae13174a1dfdc 1518  e2f7e3af6bb0ac0c7dfae13174a1dfdc 
40d0fdbbcd8fb62cfecf9aee70c32578fda927f9e3019c910f120a7b6b23c887 7305  8b53d5bd17537e5cbffbeda2b9cf5485 
0e0da03e7e40f4b33da8e0a65996f2f2 25596  0e0da03e7e40f4b33da8e0a65996f2f2 
dda62585207a03d8059562feca65375d16d7da1e19c377f010139530ee67c0b1.sys 58896 5, 1, 2600, 0836e226a2b39a93f4c4fa7d2f9dd2f55 
374454815d1c1e23cd0b0a8e34722939.vir 1311  374454815d1c1e23cd0b0a8e34722939 
2c763734fa664adb50147e0ee75d5846.vir 1299  2c763734fa664adb50147e0ee75d5846 
72BA1142.EXE 2560  c18d845cd2cb6bc086f417eed51736f305/04/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware