Home / Spyware Encyclopedia / Rootkit.Agent.egxa << Back

Recommendation to Automatically remove Rootkit.Agent.egxa


Our products can remove Rootkit.Agent.egxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egxa Details


  • Category Rootkit
  • Discovered 11/16/2014 12:36:37 PM
  • Modified 7/10/2015 10:32:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4c5904a320ad4e175b0d9b8e65bbf015.vir.exe 813056 1, 15, 1, 16114c5904a320ad4e175b0d9b8e65bbf015 
7893137db3ea9c6642ab52eb2e5a31bf.vir.exe 813056 1, 15, 1, 16117893137db3ea9c6642ab52eb2e5a31bf 
b42e38f89be005a1de0339fce7fc5d11.exe 806400 1, 15, 1, 1415b42e38f89be005a1de0339fce7fc5d11 
909b8d12f00908b574d7747038c84431.vir.exe 813056 1, 15, 1, 1611909b8d12f00908b574d7747038c84431 
000a5adfba40dc792e4e517ece7a7049.vir.exe 788992 1, 15, 1, 411000a5adfba40dc792e4e517ece7a7049 
00b7f6ac7a67e5b8f80e2008909ca4f3.vir.exe 803328 1, 15, 1, 91400b7f6ac7a67e5b8f80e2008909ca4f3 
7d3dfc0a7bda2e0e517dfcb43b7859f3.vir.exe 788992 1, 15, 1, 4117d3dfc0a7bda2e0e517dfcb43b7859f3 
00c927fe15f81de46b6ee897227a572b.vir.exe 788992 1, 15, 1, 41100c927fe15f81de46b6ee897227a572b 
00731027fd6a3f3b5b8847717b45e508.vir.exe 788992 1, 15, 1, 41100731027fd6a3f3b5b8847717b45e508 
01040e08fdd245d4c77d883b6f7cfb38.vir.exe 788992 1, 15, 1, 41101040e08fdd245d4c77d883b6f7cfb38 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware