Home / Spyware Encyclopedia / Rootkit.Agent.cxot << Back

Recommendation to Automatically remove Rootkit.Agent.cxot


Our products can remove Rootkit.Agent.cxot and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cxot Details


  • Category Rootkit
  • Discovered 11/5/2012 8:58:29 PM
  • Modified 8/26/2024 11:10:33 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e256c909564933300f7c2179920f7507.exe 1257472  e256c909564933300f7c2179920f7507 
9cfc8129772aa3ab9fbf031ee9fcda6a.exe 1253376  9cfc8129772aa3ab9fbf031ee9fcda6a 
88b943b8da51dbd6374c1dd96a41860ea06e6a205f9048d3c7244c874a6fec96fe9e1c21a38b9f8bc60c63bfcebb8f73f9f.sys 49152  7a1a4a7367600e5983cf0beb42d2238a 
106de97d0fc54c07e2d9b59b3277586bf87939e9.bin.exe 1564672  11bbf8526d08735b9590a6af3f079004 
e6d744cb600e82480e8747fe80b4683dfa924ee39df653392632d9602a6fe464a2b09d417a786a9e08601e7cde04b4b32ef.exe 1249280  4fb664877a396e740b548513e2f38da6 
75f10208c86f1f79be1136bd37f9820f21069dae.bin.exe 1253376  c7d66ebcd6c932984db158bfaafea21b 
15a60c137a99ba717d5183712e1f1d2e18f65bd5.bin.exe 1257472  177bf1ed77731b5ab3cc654407d23081 
d52b4657c98f7c6a5fcc323b23ecfea0.exe 1257472  d52b4657c98f7c6a5fcc323b23ecfea0 
6c35eb49edef7c0e42be53d78e88a8bf9a2479b0.bin.exe 1564672  9fde0d3c27eb8f8a380a28a23048b4a3 
7a512fa648d777417b9e01e05194d185.exe 1265664  7a512fa648d777417b9e01e05194d185 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware