Home / Spyware Encyclopedia / Rootkit.Agent.ci << Back

Recommendation to Automatically remove Rootkit.Agent.ci


Our products can remove Rootkit.Agent.ci and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ci Details


  • Category Rootkit
  • Discovered 1/22/2010 10:12:06 AM
  • Modified 7/22/2020 12:50:57 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2EC8084C.EXE 3653  d5a5ab5d6c755649e5f6b14a125e4c14 
fz3plus1.sys 3653  d5a5ab5d6c755649e5f6b14a125e4c14 
3a78ead1f0e25be330d4f014f07260c5.vir.exe 379784  3a78ead1f0e25be330d4f014f07260c5 
2EC8084C.EXE 3653  d5a5ab5d6c755649e5f6b14a125e4c1422/07/2020
fz3plus1.sys 3653  d5a5ab5d6c755649e5f6b14a125e4c1422/07/2020
e3c612baf4596081751dd2949d5c3ace251a5a8a8116a306e8bbec2a6dd03c0e.sys 8192  5900a59650152197a3b7fd98bcd964e9 
78e388eccc8a71f3eaf24e06360d1c46b7a9c2ab024f03c4592f7c6967f5e377.dll 163840  424f0d91bb3474ca7a7335a91c088a50 
82a3252bfebce98e6cdb4ff9ccda3e5a54c9835b.bin.exe 9813361  8a1a0bdd878ebf74718ad720b189fa77 
155258073277ca6b14a62276bcd4d12b76c2098f3b86b8f3866a9e1c38e2587e8f9bf315b08d0c2cbf8feef759ff5.exe 311340  7c7b718207bd8b82293e5a98145dacfc 
rootkit.win32.agent.ci 112128  ffe5efaf1d1de0850f689c2e0d8d31ef 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware