Home / Spyware Encyclopedia / Rootkit.Agent.grg << Back

Recommendation to Automatically remove Rootkit.Agent.grg


Our products can remove Rootkit.Agent.grg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.grg Details


  • Category Rootkit
  • Discovered 4/21/2011 4:18:39 PM
  • Modified 4/29/2021 6:03:28 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
securentm.sys 22144  cf74310571d62b4cd817433fa11aa969 
7c73a493.exe 22144  38225bf44427ce60f193d99a897580e7 
6760e323.exe 22144  368542e41059bccbab79da79f8dab37c 
rootkit.win32.agent.grg 22144  368542e41059bccbab79da79f8dab37c 
0e2ebc751b692df2f1ee9a20b49def06.exe_ati64si.sys.exe.sys 22144  e59ca01df3bbb3ba168fc49b9569f038 
3d90caa308234d90dd5814107b5f5ac66c69076e373a7649680b63f8f2c8bf10.sys 22144  fd23533b29065b441182d92986635d7d 
37bd0048fdce3713489ee72f6e1d0700a13ff00f2f8fe28262abb078fdd4dd53.sys 24568  da577575e410c96f644c90146bd0a5cb 
7774e660acf5520cb8be7a521819d9ce.sys 22144  7774e660acf5520cb8be7a521819d9ce 
bb2bfba930cf4ba7e2a67fddd5c6724172bdf174f9a92e1952df0e2c3c3e48a5.sys 22144  438a994ca9af095b7d86666781ef80ed 
07fd1f03354370116199bc105007f066.sys 22144  07fd1f03354370116199bc105007f066 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware