Home / Spyware Encyclopedia / Rootkit.Agent.iue << Back

Recommendation to Automatically remove Rootkit.Agent.iue


Our products can remove Rootkit.Agent.iue and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.iue Details


  • Category Rootkit
  • Discovered 4/29/2011 11:18:58 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
076a1966.exe 57344  af8c6aa6afed58347a9468ee4737f2b5 
ad56b42671b305dd13f6e0d16ce0b615a589eae5188626634e88a3fa10e8b06b.sys 57344  7e5dc64a66d54d87abb14c027e66c2bb 
aa50a417d78bacfd705ed674e984d164201d4df98ff80319fa4467fde960299a.sys 57344  99eca8fac32030bcd8a9c2c69abaacd3 
630c09742cc414763e1d172d15501fd3211bed90f807fd8bf80665cd71b1b98d.sys 57344  d4b7469c375950c0cb4621ce4c2ad4e2 
c26715bf502f84164b7f6aa592a1ed11.sys 57344  c26715bf502f84164b7f6aa592a1ed11 
a372bdeb68f5366b1187a7d9c6dec189904785651b865ead57e4c977b8d0d8dd.sys 57344  23c0855cb118f48e1b1b6b55cfdd3561 
7fdc64e697caa0b782813e39e6a5e50766d6bf143e2318b4b814cff468fd7cf2.sys 57344  5911cfd8f5466c1a234814944bf08f3d 
fd13e46374bccd1264951c8c1efaf85ab739cb284d8600ed91fd1ba44454390e.sys 57344  5dd6c121838a3a4c183b7d1f7201ddc4 
e05dbe511996d7914d21816b03862029.vir.sys 57344  e05dbe511996d7914d21816b03862029 
c461bc77a6c9f6ba0a57c9e1b796befe.vir.sys 57344  c461bc77a6c9f6ba0a57c9e1b796befe 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware