Home / Spyware Encyclopedia / Rootkit.Agent.gty << Back

Recommendation to Automatically remove Rootkit.Agent.gty


Our products can remove Rootkit.Agent.gty and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.gty Details


  • Category Rootkit
  • Discovered 1/11/2013 7:57:19 AM
  • Modified 5/17/2013 6:08:52 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9dc6a119be425c9f1369435e1a9e9110.exe 1130496  9dc6a119be425c9f1369435e1a9e9110 
cf15da3263b81dc3aad6ac6351c08788.exe 1130496  cf15da3263b81dc3aad6ac6351c08788 
1544100478520c741052751ed81e7e9b8a76fc30092170298f48a6e105105e677bcfc467c5eb24373c5d3868bb9eb.exe 2184192  d8400efc8834b361d63505fc12fc4f5b 
4fbaaed5d1200412eb905605edcbad57.exe 1122304  4fbaaed5d1200412eb905605edcbad57 
e2e9c22a45a3569d24f4bdbe523d8523.exe 1122304  e2e9c22a45a3569d24f4bdbe523d8523 
90d91310144121ec079c7dd2d2da869c.exe 1122304  90d91310144121ec079c7dd2d2da869c 
83f5abe1388b4e5ae87572cb9d2d9170.exe 1122304  83f5abe1388b4e5ae87572cb9d2d9170 
d2ea2f8cc7039e7f970046ff5a43261c.exe 1122304  d2ea2f8cc7039e7f970046ff5a43261c 
15585501400f03663978053922e3ac8b4c8bcc03d9f266bd439559b09bd396be7193cb3dbce64073fa5017168e99c.exe 1130496  5a1730ab0f5c00082340bb527029473e 
1454210134073c510b06e51c842bc70833da3ce9d5bc0b58b34bd09679b94c3928f83d53d2bfbbe3649b7e4d23e82.exe 1122304  e79e55091412ea17d9730c64b7a1a75e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware