Home / Spyware Encyclopedia / Rootkit.Agent.dkr << Back

Recommendation to Automatically remove Rootkit.Agent.dkr


Our products can remove Rootkit.Agent.dkr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dkr Details


  • Category Rootkit
  • Discovered 4/2/2011 12:24:46 AM
  • Modified 8/29/2024 5:52:29 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5684BC52.EXE 53760Microsoft Corporation5.1.2600.2180 (xpspfea155e37bb6473746c78bb65cdc0db3 
F70B646C.EXE 88064Microsoft Corporation5.1.2600.2180 (xpspfd55e3c348ce09801514a18c7e7f5c15 
51203182.EXE 52736Microsoft Corporation5.1.2600.2180 (xpspd716712498c4b26023e2bacb175a72c8 
6e2ff87b.exe 62976Microsoft Corporation5.1.2600.2180a9dbbd73af3182d7132855c595ff853d 
83534b54.exe 51601Microsoft Corporation5.1.2600.2180a882d6502efec4ee98fa04a7536115df 
e8db59ed.exe 88064Microsoft Corporation5.1.2600.2180a6a8671727fd3de21987f21391f69ad3 
a0c869de.exe 87552microsoft corporation5.1.2600.2180a698a43b602f4fcaf85572127c41b8de 
backdoor.win32.agent.tqi 55434Microsoft Corporation5.1.2600.2180b057d5bec526b626e967115d9f17069a 
269fcc9d9f216710076d0a5949830935.vir.exe 5426  269fcc9d9f216710076d0a5949830935 
c2701f48672e59dc7531ef8379d60b23.vir.exe 262144  c2701f48672e59dc7531ef8379d60b23 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware