Home / Spyware Encyclopedia / Rootkit.Agent.ioj << Back

Recommendation to Automatically remove Rootkit.Agent.ioj


Our products can remove Rootkit.Agent.ioj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ioj Details


  • Category Rootkit
  • Discovered 9/13/2012 5:32:53 PM
  • Modified 7/29/2023 3:38:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
go.sys 2752  e7e2c9ca4c7085ef76d43144173e718a 
32297064c3771a3346a3441b3a158939.exe 299685  47202137e791807074df402a07e94398 
7824992078194a7b4b37450d4fede09e6f6f6574.exe 418186  12a9d60827618eefd2775a5b1f1dffdc 
7b2d77245a90fd42e52a86203005fd3cc1855429.exe 136288  8f6b1ab0ad317fd8c8d9a79514694cd1 
txplatform.exe 76807  de6241e55986f3d2ce743a4448497067 
7cf016feecbd8753b6ad50d53f7194fda46ebad0.bin.sys 24855  e43effe40e5e8dcf419eea133ce5435b 
848d3698b27cedc7d206fc846296bf9e.vir.sys 129301  848d3698b27cedc7d206fc846296bf9e 
2486f190312bb54f9166739f23dadb04.exe 532594  2486f190312bb54f9166739f23dadb04 
d3d38b642e5cad4eadd990a76a0cfc92.vir.exe 1101375  d3d38b642e5cad4eadd990a76a0cfc92 
049bf877886cd4c7bb6d37b9de9765a43a423cbc6dac4bdfa6ecde4cc0471a558eed53e7d846a71b5fa30de8617682a51c2466f9104656ebed74fbc067174718.exe 76807  29204fe068883ad70a34bdfc4dce28f321/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware