Home / Spyware Encyclopedia / Rootkit.Agent.iue << Back

Recommendation to Automatically remove Rootkit.Agent.iue


Our products can remove Rootkit.Agent.iue and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.iue Details


  • Category Rootkit
  • Discovered 4/29/2011 11:18:58 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c1f5185ddea71b6a8a9f98625b21238e.sys 57344  c1f5185ddea71b6a8a9f98625b21238e 
e8a986bdd4457798e737872276413f6e.sys 57344  e8a986bdd4457798e737872276413f6e 
bb21adc661c51afe8a8de78936830268.sys 57344  bb21adc661c51afe8a8de78936830268 
4113f586b6b48c5e5ebbdb4a18d02680.sys 57344  4113f586b6b48c5e5ebbdb4a18d02680 
de0ad054684d60b263d19d103b496c3898bd78375d11301d345045da1a89b34d.sys 57344  4b380d8d7a6bfab3eda17640bfc4fee3 
8efcc32458dcbb0336379caf6489450b.sys 57344  8efcc32458dcbb0336379caf6489450b 
c26715bf502f84164b7f6aa592a1ed11.sys 57344  c26715bf502f84164b7f6aa592a1ed11 
c52fc3a2c03ef97b48278bee4593b719.sys 57344  c52fc3a2c03ef97b48278bee4593b719 
0902b3b052479ee233325642e6f370d5fc0477661624db7e6a3b55ff0777b563.sys 57344  e707bcbaf0658ff862047a13ac40edd6 
8a5ccf63dcedeafcd3c323659c34d505.sys 57344  8a5ccf63dcedeafcd3c323659c34d505 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware