Home / Spyware Encyclopedia / Rootkit.Agent.btu << Back

Recommendation to Automatically remove Rootkit.Agent.btu


Our products can remove Rootkit.Agent.btu and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.btu Details


  • Category Rootkit
  • Discovered 3/28/2011 6:50:55 PM
  • Modified 7/27/2023 4:43:31 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
74D9B1E1.EXE 50176  dc46aaeb8e2130374eb30451fe7896fd 
3375C303.EXE 49152  a5b0e1facf4e32c0ef456551e01983fe 
39F45FC1.EXE 51712  2cf7cc5a3d51d7e1cb8a89754d7ce3bd 
rootkit.win32.agent.btu 49152Microsoft Corporation5.1.2600.2180a5b0e1facf4e32c0ef456551e01983fe 
7d3868e2db16ef6303722fd5938f6fed.vxe.exe 140800Microsoft Corporation5.1.2600.2180 (xpsp7d3868e2db16ef6303722fd5938f6fed 
0819154_000122880-D88F80F2_1b13365ababd58836a74f1bf7c2a2e39.EXE 0Microsoft Corporation5.1.2600.2180 (xpsp1b13365ababd58836a74f1bf7c2a2e3927/07/2023
1473a6a217f16355f592d401c27012daf24415100abaa28a4f40159abbf75619.exe 58880  be1da4f4d1cd05aa8c9ae73ca25d721c 
b31fc572f3e1d4a4e2867417a5aa7dc5.vxe.exe 48640Microsoft Corporation5.1.2600.2180 (xpspb31fc572f3e1d4a4e2867417a5aa7dc5 
9d95025771d86467fa825d6846557123.vxe.exe 48640Microsoft Corporation5.1.2600.2180 (xpsp9d95025771d86467fa825d6846557123 
09a1aac1.exe 117760Microsoft Corporation6.0.2900.2180a0e1dc421c402c5b0ae352367c5efbfe 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware