Home / Spyware Encyclopedia / Rootkit.Agent.ekta << Back

Recommendation to Automatically remove Rootkit.Agent.ekta


Our products can remove Rootkit.Agent.ekta and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ekta Details


  • Category Rootkit
  • Discovered 8/9/2024 1:21:22 PM
  • Modified 8/12/2024 12:17:29 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
de35ec6ef3012968826327209454f921.sys 254976Windows (R) Win 7 DDK provider6.1.7600.16385 builde35ec6ef3012968826327209454f921 
virusshare_25444b3eb28ff5a52c9c40557b7c7200.sys 86272  25444b3eb28ff5a52c9c40557b7c7200 
3709c26bbcd35ba5211e5f243d664e8f.sys 46592  3709c26bbcd35ba5211e5f243d664e8f 
e077158086ce31f3c72db615cb4222dd.sys 7394  e077158086ce31f3c72db615cb4222dd 
1059-57902b5e957d820bfd1c72ea245f8b5436841017.exe 80752  5eb196194f4a647d2ad67ade1540489d14/10/2020
0ca9c0c3941cb58203a231be9c6b831b4eb5fad514f3a354d252237447a6aae3.mrg.exe 472576  2496c11f55a26c9ab9f4da9af4085f1413/10/2021
c5acc5ec0f2d846f53f9c6c9ef7958772977ea9bba6d0fbc5df052f017b685aa.mrg.exe 50552  0b1e6a1b307ad69a9567b576cbc7b33913/10/2021
00d7fb558e0f30e0646fbfbebdae466c.exe 95232  00d7fb558e0f30e0646fbfbebdae466c29/04/2022
1145a34c681af229fb5d9c2c9cae2527.exe 86272  1145a34c681af229fb5d9c2c9cae252729/04/2022
1eafc6db5e565aa3af0aa82a189a33ab.sys 71680  1eafc6db5e565aa3af0aa82a189a33ab14/05/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware