Home / Spyware Encyclopedia / Rootkit.Agent.pk << Back

Recommendation to Automatically remove Rootkit.Agent.pk


Our products can remove Rootkit.Agent.pk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.pk Details


  • Category Rootkit
  • Discovered 3/2/2012 6:55:39 PM
  • Modified 7/24/2023 3:07:39 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b5292e3e606404aa10dbf836d70baca2.sys 19200  b5292e3e606404aa10dbf836d70baca2 
17ac275929daab71d5bfc816b72e5ce6.sys 19200  17ac275929daab71d5bfc816b72e5ce6 
163704001404185508a0c01642d7b687c9391961be0d5d3b05a1a924469a225deb807bf8c61a788d68a62794a5535.sys 19200  c5b0c356b5ebaa27954a582facf7a54a 
d6192beeb9ad1a6673cf0614c90f90ca.sys 19200  d6192beeb9ad1a6673cf0614c90f90ca18/07/2023
4c1279e164e4ab4e15d142b0b3615f83b60a0e6a1ccc6219c3e1b2764d9de4c9a41ff47893b95387aa6c09648806f074579.sys 19200  e5e42cb74df7113d7471775a39d3b9a918/07/2023
5fde6594df3eedeca05f7197f786f663.sys 4608  5fde6594df3eedeca05f7197f786f66324/07/2020
32D30CE8.EXE 4608  f67c29305977045c62c465818e6f140f24/06/2020
b39c6dba8949afc331bac75da4e6133a.vir.sys 19200  b39c6dba8949afc331bac75da4e6133a 
26b45d8ae593ea70c5be8ab1232f483a.vir.sys 19200  26b45d8ae593ea70c5be8ab1232f483a 
8febd9cd132cdf99e135d8598373dfd4.vir.sys 19200  8febd9cd132cdf99e135d8598373dfd4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware