Home / Spyware Encyclopedia / Rootkit.Agent.czrc << Back

Recommendation to Automatically remove Rootkit.Agent.czrc


Our products can remove Rootkit.Agent.czrc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.czrc Details


  • Category Rootkit
  • Discovered 8/27/2013 7:37:23 PM
  • Modified 10/14/2024 11:31:19 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
783991521075c322a419717eb360d70c.sys 150804 2, 0, 0, 257783991521075c322a419717eb360d70c 
d914803a61cbbe3ea61dc31ac2137c56.tmp.sys 30357  d914803a61cbbe3ea61dc31ac2137c56 
0158f70c7bdacb3fea16ad77191fdd57ecac6582.bin.sys 149493 2, 0, 0, 2578f953169f41a8d04628f231be825cc50 
fa49ed65bd5e871510c3b7849d2f558a.sys 139813 2, 0, 0, 257fa49ed65bd5e871510c3b7849d2f558a 
1d22dd00c74720eaee02a196aab2b823.sys 86854  1d22dd00c74720eaee02a196aab2b823 
be9ff2d3c8ccca1a1aa304ba2e49f978.bm.sys 145173 2, 0, 0, 257be9ff2d3c8ccca1a1aa304ba2e49f978 
4f0969446760484400ed8eb74c3141ec.sys 129981 2, 0, 0, 2574f0969446760484400ed8eb74c3141ec 
cff42f67563ac52c202a1e6e34597101.sys 137675 2, 0, 0, 257cff42f67563ac52c202a1e6e34597101 
4d642cfce951884b804183888bbe404a.sys 41689  4d642cfce951884b804183888bbe404a 
b29304788f05a04c0e09b6dae432ea39.sys 40389  b29304788f05a04c0e09b6dae432ea39 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware