Home / Spyware Encyclopedia / Rootkit.Agent.czrc << Back

Recommendation to Automatically remove Rootkit.Agent.czrc


Our products can remove Rootkit.Agent.czrc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.czrc Details


  • Category Rootkit
  • Discovered 6/30/2012 9:25:56 AM
  • Modified 4/13/2023 5:28:20 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
783991521075c322a419717eb360d70c.sys 150804 2, 0, 0, 257783991521075c322a419717eb360d70c 
1d19398b5a76f9e03c5e9a7f878e0c35.sys 32458  1d19398b5a76f9e03c5e9a7f878e0c35 
a6dcbe71cb2674ca5c7d1645b90259f2cbc04aa0.bin.sys 115933 2, 0, 0, 257c6fe6b3f47bdb558d00db77e0e056e4b 
eb91dd416dadb972328e379ed3958176.sy.sys 143734 2, 0, 0, 257eb91dd416dadb972328e379ed3958176 
ec0bed60315616b978d76c6b1983deb6.sys 29315  ec0bed60315616b978d76c6b1983deb6 
fa49ed65bd5e871510c3b7849d2f558a.sys 139813 2, 0, 0, 257fa49ed65bd5e871510c3b7849d2f558a 
be9ff2d3c8ccca1a1aa304ba2e49f978.bm.sys 145173 2, 0, 0, 257be9ff2d3c8ccca1a1aa304ba2e49f978 
b0729a7c0754e8f9a7a2edba6cdc6279.sys 146695 2, 0, 0, 257b0729a7c0754e8f9a7a2edba6cdc6279 
7c5f0f6d499492e7aa3737a30a878fce.sys 101333  7c5f0f6d499492e7aa3737a30a878fce 
0080898b3f0b1a1d6dc395af70a426ab11193ea1ac66dfa841a45b91ef325886_ddkstat2.sys.exe.sys 149660 2, 0, 0, 257d6ca63f6a45be0e6df80d982be7413fc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware