Home / Spyware Encyclopedia / Rootkit.Agent.beqz << Back

Recommendation to Automatically remove Rootkit.Agent.beqz


Our products can remove Rootkit.Agent.beqz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.beqz Details


  • Category Rootkit
  • Discovered 4/14/2010 1:04:07 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2afdc289.exe 18528  5d736ecf419b1bb19ba2eeddc1f55d70 
kfmf9bf.sys 144704  45f18753ed06e437034f97c9603c2b7c 
60094bc8ca38111c554ecf1c268cadbdc451d47f1f55e3ec089574a3b7a6b3d6_tgob9d9.sys.exe.sys 144704  75524db39324e34849a2f1e64aea394e 
8cf6b777660da2412279742b0ddec15303c65144089a826739afcbac76989dc1_hpc395d.sys.exe 21664  ff09e3c4f639900a3713e314c8def1a7 
26177444d19df8272ae4bc8b73ed33ad.sys 179648  26177444d19df8272ae4bc8b73ed33ad 
e98babf7f10a45ea4bec01ca9caf7aad.sys 144704  e98babf7f10a45ea4bec01ca9caf7aad 
81f8a8aed870636a58c71e938010d19cf2fdeaa0b9328bd1fba3ba9de04629d5aaa85b0a41a5d13a76b7f7071b1f71e90606feb9449dfb2f57b135d87349786b.sys 18528  67c14c19776fd35c6ff239682631b732 
0cecc5ba724a3748ce9ee3f7f9938cb2.sys 22816  0cecc5ba724a3748ce9ee3f7f9938cb2 
ce615e89631fc31b696279a0573ad3d2.vir.sys 153728  ce615e89631fc31b696279a0573ad3d2 
791d1b522585978e209a59199111853b.vir.sys 22272  791d1b522585978e209a59199111853b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware