Home / Spyware Encyclopedia / Rootkit.Agent.cxot << Back

Recommendation to Automatically remove Rootkit.Agent.cxot


Our products can remove Rootkit.Agent.cxot and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cxot Details


  • Category Rootkit
  • Discovered 11/5/2012 8:58:29 PM
  • Modified 8/26/2024 11:10:33 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e256c909564933300f7c2179920f7507.exe 1257472  e256c909564933300f7c2179920f7507 
e6d744cb600e82480e8747fe80b4683dfa924ee39df653392632d9602a6fe464a2b09d417a786a9e08601e7cde04b4b32ef.exe 1249280  4fb664877a396e740b548513e2f38da6 
88b943b8da51dbd6374c1dd96a41860ea06e6a205f9048d3c7244c874a6fec96fe9e1c21a38b9f8bc60c63bfcebb8f73f9f.sys 49152  7a1a4a7367600e5983cf0beb42d2238a 
15a60c137a99ba717d5183712e1f1d2e18f65bd5.bin.exe 1257472  177bf1ed77731b5ab3cc654407d23081 
13250401295f58113f5bd418c36b5b1f4444548c56201719279ada11a4e30168a51c0b7ca4120a781b6f2e21f75c7.exe 1544192  f2cc8bb2ffc0060ee169c746e832b887 
b07544fdf72c64a2ae770475c295a905.exe 1265664  b07544fdf72c64a2ae770475c295a905 
d3e7990fafdcb265d4261b95e6500976.exe 1257472  d3e7990fafdcb265d4261b95e6500976 
cc13bf4defa0b74c5778006348a2ce737109d287.bin.exe 1531904  52058d4555b420a589636ed0f9967aa2 
21917cc2ffe88228d0fad51be14527e0.exe 1523712  21917cc2ffe88228d0fad51be14527e0 
217e45bc3a524699128d1c513f9b99cb.exe 1527808  217e45bc3a524699128d1c513f9b99cb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware