Home / Spyware Encyclopedia / Rootkit.Agent.ioj << Back

Recommendation to Automatically remove Rootkit.Agent.ioj


Our products can remove Rootkit.Agent.ioj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ioj Details


  • Category Rootkit
  • Discovered 9/13/2012 5:32:53 PM
  • Modified 7/29/2023 3:38:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
go.sys 2752  e7e2c9ca4c7085ef76d43144173e718a 
32297064c3771a3346a3441b3a158939.exe 299685  47202137e791807074df402a07e94398 
7824992078194a7b4b37450d4fede09e6f6f6574.exe 418186  12a9d60827618eefd2775a5b1f1dffdc 
7b2d77245a90fd42e52a86203005fd3cc1855429.exe 136288  8f6b1ab0ad317fd8c8d9a79514694cd1 
¡¡¡¡¡¡.exe 76807  de6241e55986f3d2ce743a4448497067 
txplatform.exe 76807  de6241e55986f3d2ce743a4448497067 
7cf016feecbd8753b6ad50d53f7194fda46ebad0.bin.sys 24855  e43effe40e5e8dcf419eea133ce5435b 
130508081253775e4ccf4410a953e0a513e39b2dd1b9f9b53a965cd770a185c7db898438cf1447248cbe3e1d1a5ed.sys 32768  3de1fd35008cc12ee4be17887c30da9e 
4c6602b06a6e371d14f6b7adec811559e10c9064fe4038eb3ad2b78ef82f711f.sys 16384  e4d84f65ed3d6902b966b4045b2ba753 
848d3698b27cedc7d206fc846296bf9e.vir.sys 129301  848d3698b27cedc7d206fc846296bf9e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware