Home / Spyware Encyclopedia / Rootkit.Agent.ioj << Back

Recommendation to Automatically remove Rootkit.Agent.ioj


Our products can remove Rootkit.Agent.ioj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ioj Details


  • Category Rootkit
  • Discovered 9/13/2012 5:32:53 PM
  • Modified 7/29/2023 3:38:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
go.sys 2752  e7e2c9ca4c7085ef76d43144173e718a 
¡¡¡¡¡¡.exe 76807  de6241e55986f3d2ce743a4448497067 
130508081253775e4ccf4410a953e0a513e39b2dd1b9f9b53a965cd770a185c7db898438cf1447248cbe3e1d1a5ed.sys 32768  3de1fd35008cc12ee4be17887c30da9e 
4c6602b06a6e371d14f6b7adec811559e10c9064fe4038eb3ad2b78ef82f711f.sys 16384  e4d84f65ed3d6902b966b4045b2ba753 
049bf877886cd4c7bb6d37b9de9765a43a423cbc6dac4bdfa6ecde4cc0471a558eed53e7d846a71b5fa30de8617682a51c2466f9104656ebed74fbc067174718.exe 76807  29204fe068883ad70a34bdfc4dce28f321/07/2023
7cf016feecbd8753b6ad50d53f7194fda46ebad0.bin.sys 24855  e43effe40e5e8dcf419eea133ce5435b29/07/2023
568e2dc367a8d73cb8fe6904e75df2fb.sys 2839  568e2dc367a8d73cb8fe6904e75df2fb17/04/2020
2e0ea8c30e772ddab353667a215a5846.vir.exe 1012468  2e0ea8c30e772ddab353667a215a5846 
b9e4aaebc8e59c77576065598b169cd9.vir.exe 915484  b9e4aaebc8e59c77576065598b169cd9 
d3d38b642e5cad4eadd990a76a0cfc92.vir.exe 1101375  d3d38b642e5cad4eadd990a76a0cfc92 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware