Home / Spyware Encyclopedia / Rootkit.Agent.egxa << Back

Recommendation to Automatically remove Rootkit.Agent.egxa


Our products can remove Rootkit.Agent.egxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egxa Details


  • Category Rootkit
  • Discovered 11/16/2014 12:36:37 PM
  • Modified 7/10/2015 10:32:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
043834454c43665019f6251bda0d7d55.vir.exe 803328 1, 15, 1, 914043834454c43665019f6251bda0d7d55 
7893137db3ea9c6642ab52eb2e5a31bf.vir.exe 813056 1, 15, 1, 16117893137db3ea9c6642ab52eb2e5a31bf 
909b8d12f00908b574d7747038c84431.vir.exe 813056 1, 15, 1, 1611909b8d12f00908b574d7747038c84431 
0608422576e8bf393ac720989f026b1a.vir.exe 788992 1, 15, 1, 5150608422576e8bf393ac720989f026b1a 
094eae112949a1afff9a6fb2ed751576.vir.exe 788992 1, 15, 1, 515094eae112949a1afff9a6fb2ed751576 
082785a8d4461ee956dab5cb0309c9aa.vir.exe 788992 1, 15, 1, 515082785a8d4461ee956dab5cb0309c9aa 
0905805dc4c7af43ae0c3f5801f5eaa5.vir.exe 788992 1, 15, 1, 5150905805dc4c7af43ae0c3f5801f5eaa5 
0ad327240b569cbf1c5386fbef8827b7.vir.exe 788992 1, 15, 1, 5150ad327240b569cbf1c5386fbef8827b7 
d533a44e62b1d54e5148d1db3f7ca0ab.vir.exe 788992 1, 15, 1, 515d533a44e62b1d54e5148d1db3f7ca0ab 
b42e38f89be005a1de0339fce7fc5d11.exe 806400 1, 15, 1, 1415b42e38f89be005a1de0339fce7fc5d11 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware