Home / Spyware Encyclopedia / Rootkit.Agent.amu << Back

Recommendation to Automatically remove Rootkit.Agent.amu


Our products can remove Rootkit.Agent.amu and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.amu Details


  • Category Rootkit
  • Discovered 3/12/2013 9:35:20 PM
  • Modified 8/3/2023 5:33:27 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3b33769c66e1a7702c8dd026ebae1cf63eede38bfbe42f849ec21b58357c8615.sys 46912  1222ea9b95bfdc6a7ecef8e73472034d 
434aabca4a71659078476bd446c0a7f5.sys 46912  434aabca4a71659078476bd446c0a7f5 
a4b3383ca00e20bb100dc2eb699a2d15bfc57a988b49cacd3220bbfcd83bbff1.sys 46912  762e3d2875b7ea9d013c09db89ae3ff1 
a8ac6628341e8fdfe4a7644805fa8d1d.vir.sys 46912  a8ac6628341e8fdfe4a7644805fa8d1d 
ec8eecbca9c59547d7736dfd29a87a36.vir.sys 46912  ec8eecbca9c59547d7736dfd29a87a36 
a4b3383ca00e20bb100dc2eb699a2d15bfc57a988b49cacd3220bbfcd83bbff1.sys 46912  762e3d2875b7ea9d013c09db89ae3ff103/08/2023
d49cb069abd05660f95fbc129aa5abbf.vir.sys 46912  d49cb069abd05660f95fbc129aa5abbf 
0cb476b5dd256329513e82812021ca27.vir.sys 46912  0cb476b5dd256329513e82812021ca27 
2d9250bbc3aab24b87dfd2f91b5b3937.vir.sys 46912  2d9250bbc3aab24b87dfd2f91b5b3937 
a8c4a8086e13d161606409ea5273af25be76ab5784c3e3acc35162d1293b979d.sys 46912  030b41c931d8e830773e26379c1d6da1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware