Home / Spyware Encyclopedia / Rootkit.Agent.ioj << Back

Recommendation to Automatically remove Rootkit.Agent.ioj


Our products can remove Rootkit.Agent.ioj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ioj Details


  • Category Rootkit
  • Discovered 9/13/2012 5:32:53 PM
  • Modified 7/29/2023 3:38:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
txplatform.exe 76807  de6241e55986f3d2ce743a4448497067 
4c6602b06a6e371d14f6b7adec811559e10c9064fe4038eb3ad2b78ef82f711f.sys 16384  e4d84f65ed3d6902b966b4045b2ba753 
049bf877886cd4c7bb6d37b9de9765a43a423cbc6dac4bdfa6ecde4cc0471a558eed53e7d846a71b5fa30de8617682a51c2466f9104656ebed74fbc067174718.exe 76807  29204fe068883ad70a34bdfc4dce28f321/07/2023
7cf016feecbd8753b6ad50d53f7194fda46ebad0.bin.sys 24855  e43effe40e5e8dcf419eea133ce5435b29/07/2023
568e2dc367a8d73cb8fe6904e75df2fb.sys 2839  568e2dc367a8d73cb8fe6904e75df2fb17/04/2020
¡¡¡¡¡¡.exe 76807  de6241e55986f3d2ce743a4448497067 
go.sys 2752  e7e2c9ca4c7085ef76d43144173e718a 
d3d38b642e5cad4eadd990a76a0cfc92.vir.exe 1101375  d3d38b642e5cad4eadd990a76a0cfc92 
2963df500aa53613184e8b59aeed7c7d.vir.exe 359811  2963df500aa53613184e8b59aeed7c7d 
130508081253775e4ccf4410a953e0a513e39b2dd1b9f9b53a965cd770a185c7db898438cf1447248cbe3e1d1a5ed.sys 32768  3de1fd35008cc12ee4be17887c30da9e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware