Home / Spyware Encyclopedia / Rootkit.Agent.l << Back

Recommendation to Automatically remove Rootkit.Agent.l


Our products can remove Rootkit.Agent.l and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.l Details


  • Category Rootkit
  • Discovered 9/27/2011 10:28:43 AM
  • Modified 11/16/2023 11:09:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
08dbbf45.exe 20992  8f3bc5f9671cd9d732da26602332e1a0 
866782d2b8a07f6de9ce4ed1611c5d96a988d4b8.{ovl}{pe}.exe 7976  328b94fd97e017c36b8262726bf394d7 
697be722d115b3e39f7528d448f6a57e1e54392b.{ovl}{pe}.exe 9332  f42ca21a1824799f5a9cb90f20c69d22 
7ffae27cfd978e848c459ea5d420208f.sys 10472  7ffae27cfd978e848c459ea5d420208f 
22c8e82a9710b8eb6956b6ee751c2986.sys 6656  22c8e82a9710b8eb6956b6ee751c2986 
671834f4c12399c15f345032b85573d93daed16b64600a4565a352c76e1d1217.sys 20388  92fe21d6834187564260edfe43c367f0 
16badc7adb10cf46f0b70fd8e1f98fdb.sys 160904  16badc7adb10cf46f0b70fd8e1f98fdb 
9accd1ac4745f2fa72e663534c8d4ef4.exe 241708 1.0.0.89accd1ac4745f2fa72e663534c8d4ef4 
4fae95dae6ef04787fc8700c479f5040.sys 7576  4fae95dae6ef04787fc8700c479f5040 
b1686820ab1b4906e7947fbbd95a2b79.sys 6656  b1686820ab1b4906e7947fbbd95a2b79 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware