Home / Spyware Encyclopedia / Rootkit.Agent.acxu << Back

Recommendation to Automatically remove Rootkit.Agent.acxu


Our products can remove Rootkit.Agent.acxu and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.acxu Details


  • Category Rootkit
  • Discovered 8/11/2012 1:21:25 AM
  • Modified 8/9/2023 3:12:32 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ksxxnl.sys 22144  9359d0e798645b5d8d3b1c899241e82a 
d3cbb8c5e8de3d824b7f5d068ce22ae81b37156d.{pe}.exe 22400  ce1862259d6787890cbe361e90c92787 
b811b1b8890bd4b2cd9a03b92848fa79.sys 22912  b811b1b8890bd4b2cd9a03b92848fa79 
0444709c594252b6c662d39968537073.sys 22016  0444709c594252b6c662d39968537073 
b26c4e73ba5489bc55ecc5957b8a7f6f5dc0ffc4c23741a6ccd7325e5a3d2df0cc80b8631d26f5a2cb027755b715dfee1c6.sys 22912  006a38deda1f3da4cddf97b69940cda2 
19562802504d45458b42637231935b34e3d5a0393771cc2da3579bf54ca38b5c925ed16efc2f3bc18537323cab34a.sys 22912  12d8f4273b2c33e3c8193b61027ec2f9 
0d0e9efb196621589a53b34697c16e67.sys 21120  0d0e9efb196621589a53b34697c16e67 
0fc4bda9adbbbaad310258f7eb2a4792.sys 2176  0fc4bda9adbbbaad310258f7eb2a4792 
93450f44f8570989ca24642bbe8deb1f.sys 21632  93450f44f8570989ca24642bbe8deb1f 
1638c3262f01e873e2b8ca5e6ad36f60.sys 21376  1638c3262f01e873e2b8ca5e6ad36f60 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware