Home / Spyware Encyclopedia / Rootkit.Agent.ccn << Back

Recommendation to Automatically remove Rootkit.Agent.ccn


Our products can remove Rootkit.Agent.ccn and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ccn Details


  • Category Rootkit
  • Discovered 1/6/2014 8:05:31 AM
  • Modified 7/27/2023 4:45:30 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.ayu 29184  f53e79f1c3bbeea144b6828b0976d7ad 
65cd0a49966a9b1869e047e059b7bf06.vir.exe 36864  65cd0a49966a9b1869e047e059b7bf06 
virusshare_7d5b20f70fa1263f5f249a72a81b93dc.exe 14848  7d5b20f70fa1263f5f249a72a81b93dc08/08/2023
a0a1bc695e0f2a03b62ae7aa93f643d4.vir.exe 14848  a0a1bc695e0f2a03b62ae7aa93f643d427/07/2023
p000514_000014848-3f0592fe_fc471fd1c4c62085a5b6936250aaf87f.exe 14848  fc471fd1c4c62085a5b6936250aaf87f25/01/2020
082f993a10b72ac8756eb30e31fea7f918fab473995cdcb2b88c222e35a7a2c3.exe 14848  c06144c72debf0dcbc5c7511828b2e4425/01/2020
42c046584acbdcb0c58dd261fc2a5bfd02269774db3fe127a060b9bc9c6704a3.exe 14848  c877a3ed95ea87140805efac576a5da325/01/2020
8c4e4dd8e798a2f53fdf94881448e993.vir.exe 29184  8c4e4dd8e798a2f53fdf94881448e993 
8fec4bea19e2b4f0535c5b1d3f5c90fc.vir.exe 29184  8fec4bea19e2b4f0535c5b1d3f5c90fc 
317b0aeb19fdce4ad5ee0d01dbed48f0.vir.exe 41472  317b0aeb19fdce4ad5ee0d01dbed48f0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware