Home / Spyware Encyclopedia / Rootkit.Agent.dw << Back

Recommendation to Automatically remove Rootkit.Agent.dw


Our products can remove Rootkit.Agent.dw and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dw Details


  • Category Rootkit
  • Discovered 9/18/2011 7:38:04 PM
  • Modified 8/9/2023 3:11:33 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5f75002a.exe 5632  968c7af68e5349b9cab315c965aadd84 
runtime.sys 4864  152d315ef76cef1010b05cde5aee2468 
7a43f904b43663e6219909f9a67b9335521c150392e825d347cbd598a75eab30f90402608e392a788744fc778e608067be0.sys 4864  cf013377acd7c3a000e0e3c6a4ce4c15 
a63b5d10ec54ef75280b4d7efc7800eb.sys 4352  a63b5d10ec54ef75280b4d7efc7800eb 
e8afe16497308dcb67429098524f1604.vir.sys 8512  e8afe16497308dcb67429098524f1604 
8301f2db8b4b07355f2284b314a065f1.vir.sys 4736  8301f2db8b4b07355f2284b314a065f1 
94028b45ec32708745a5a25a53b456099a49a50a3ee700aba40e528d66e9f4419551b4f323da4faceaae858b333e4378946.sys 8512  69e6ada62bd61931b0861a71acdd3ffc09/08/2023
a63b5d10ec54ef75280b4d7efc7800eb.sys 4352  a63b5d10ec54ef75280b4d7efc7800eb05/07/2022
1f8282d927ef4b88ee425b03ff832fc4.vir.sys 7168  1f8282d927ef4b88ee425b03ff832fc4 
dbe89903d7528f1f55dd34f95ef7e3a5.vir.sys 7168  dbe89903d7528f1f55dd34f95ef7e3a5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware