Home / Spyware Encyclopedia / Rootkit.Agent.ejkl << Back

Recommendation to Automatically remove Rootkit.Agent.ejkl


Our products can remove Rootkit.Agent.ejkl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ejkl Details


  • Category Rootkit
  • Discovered 7/14/2016 2:06:36 PM
  • Modified 7/15/2016 11:50:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7fb95562bc85cb45a684dd42a4f94031.vir.exe 375677  7fb95562bc85cb45a684dd42a4f94031 
d93d851e9c8b5d171a4803e3ff9ee39e.vir.exe 370089  d93d851e9c8b5d171a4803e3ff9ee39e 
virusshare_59e1340a01935ac0d929a716e1e2fff5.exe 326716  59e1340a01935ac0d929a716e1e2fff5 
abbada5cf2e890c9433bc7e0ef5b8574.vir.exe 374084  abbada5cf2e890c9433bc7e0ef5b8574 
93300d7252c22b8bcd653264bdace928.vir.exe 373178  93300d7252c22b8bcd653264bdace928 
ca9ce19f0087b9d2b8d0c277f9278c1e.vir.exe 189760  ca9ce19f0087b9d2b8d0c277f9278c1e 
c540b157be0fc1be2ef4035345474df5.vir.exe 347329  c540b157be0fc1be2ef4035345474df5 
922d0278e0bd40eadb84e496de70c2b0.vir.exe 375630  922d0278e0bd40eadb84e496de70c2b0 
6ec0ff416942ce2c5d252f1270d35aad.vir.exe 190571  6ec0ff416942ce2c5d252f1270d35aad 
9bb7289b4e4ddb23b10925406afdbdce.vir.exe 190571  9bb7289b4e4ddb23b10925406afdbdce 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware