Home / Spyware Encyclopedia / Rootkit.Agent.pq << Back

Recommendation to Automatically remove Rootkit.Agent.pq


Our products can remove Rootkit.Agent.pq and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.pq Details


  • Category Rootkit
  • Discovered 6/12/2010 3:37:11 PM
  • Modified 8/9/2023 3:11:33 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
04cba5bb.exe 35328  3a7fa1f2d574e692585e559aab875b60 
11658c26dbbb63f09ce98f6cab064faa.sys 35328  11658c26dbbb63f09ce98f6cab064faa 
16cc6e71e123b90b5b33f4a11873649a15d72b211e3e850f5378a97db12acf20.sys 35328  0238fac1ce56db801678e379b454d14f 
3f8c12e778b247daec0d12a290152513.vir.sys 35328  3f8c12e778b247daec0d12a290152513 
d64d964965f1115528dc1b6c1e4db9f44c22d6fd50d538b30d20d64d3b6d7dd9.sys 35328  3f9e4443ea4c4a54cef082e91c3f3391 
e3e456f64dbcd20572d0ad8298195637675853538875e16139b67040bc885aa7.sys 35328  2d52b9693b93d17829c04181823e6dca 
a5385996edc20e27cd28bed1360950ce.sys 34304  a5385996edc20e27cd28bed1360950ce 
91cef6687e1e16241848de5cb8f98f80.sys 35328  91cef6687e1e16241848de5cb8f98f80 
173fc09618a81f3223188f78e576a6be0fc2deaf.bin.sys 34304  15f2b560c070d1327550ba093c381a6e 
ab3bb6a820d005af49536a0d8b3811b9.sys 35328  ab3bb6a820d005af49536a0d8b3811b9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware