Home / Spyware Encyclopedia / Rootkit.Agent.beur << Back

Recommendation to Automatically remove Rootkit.Agent.beur


Our products can remove Rootkit.Agent.beur and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.beur Details


  • Category Rootkit
  • Discovered 6/8/2010 9:03:07 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2faee494.exe 497664Microsoft Corporation1.0.0.1d5b99e1b13b48d5c69a46ba5aad43756 
b320da0f.exe 497664Microsoft Corporation1.0.0.14398d8d6f049974d0e4692f34cc0d9af 
62027fab.exe 497664Microsoft Corporation1.0.0.11d2d6a69ed2d7db03e320db926966e07 
485a16bb.exe 497664Microsoft Corporation1.0.0.1a24fcd612dffd8b3da380541fa709c22 
6997892ee12bc286c71bde6b66644f2b.sys 497664Microsoft Corporation5.1.2600.06997892ee12bc286c71bde6b66644f2b 
47315144f081c5306744fbe0ae6fba06.sys 497664Microsoft Corporation5.1.2600.047315144f081c5306744fbe0ae6fba06 
f9566a1c7dd3b9bb8b24d86fdfb708aa.sys 497664Microsoft Corporation5.1.2600.0f9566a1c7dd3b9bb8b24d86fdfb708aa 
c02edf37795ae899d26241c12e44ff770dc1d520.bin.sys 497664Microsoft Corporation5.1.2600.0ab92297ce238658e6840d7e5f4f73712 
ea3680dbf74f2d4e78235bade89c49a1dc3a18e0.bin.sys 497664Microsoft Corporation5.1.2600.0aa8e761a031fb4d42dd844e637caa129 
3848ca99ce7cbdd1449a78321035388c.sys 497664Microsoft Corporation5.1.2600.03848ca99ce7cbdd1449a78321035388c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware