Home / Spyware Encyclopedia / Rootkit.Agent.l << Back

Recommendation to Automatically remove Rootkit.Agent.l


Our products can remove Rootkit.Agent.l and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.l Details


  • Category Rootkit
  • Discovered 9/27/2011 10:28:43 AM
  • Modified 11/16/2023 11:09:57 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7549c676.exe 1748242 3.3.0.095a25c19bfbf58d8981c73e9a3fb9b7a 
msdirectx.sys 6656  8e1e197d413b12baed58bd07e4112092 
866782d2b8a07f6de9ce4ed1611c5d96a988d4b8.{ovl}{pe}.exe 7976  328b94fd97e017c36b8262726bf394d7 
697be722d115b3e39f7528d448f6a57e1e54392b.{ovl}{pe}.exe 9332  f42ca21a1824799f5a9cb90f20c69d22 
9accd1ac4745f2fa72e663534c8d4ef4.exe 241708 1.0.0.89accd1ac4745f2fa72e663534c8d4ef4 
193557070328970094a6882250d3ddd5123fa0e6e54ca04d825acfb4358cad1e565c1d6b1ad829a2fe461003e2317.exe 241708 1.0.0.89accd1ac4745f2fa72e663534c8d4ef4 
4fae95dae6ef04787fc8700c479f5040.sys 7576  4fae95dae6ef04787fc8700c479f5040 
b1686820ab1b4906e7947fbbd95a2b79.sys 6656  b1686820ab1b4906e7947fbbd95a2b79 
4ea650019b2cbe99cd9317ef55895e5e.sys 18468  4ea650019b2cbe99cd9317ef55895e5e 
9ca47a17c280fd0c6a6becb814d7f4aa357a20ad216291afbfba1a4ebf87903a.sys 13647  7a22b8cfbb6a3d298d6e390128180e85 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware