Home / Spyware Encyclopedia / Rootkit.Agent.egxa << Back

Recommendation to Automatically remove Rootkit.Agent.egxa


Our products can remove Rootkit.Agent.egxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egxa Details


  • Category Rootkit
  • Discovered 11/16/2014 12:36:37 PM
  • Modified 7/10/2015 10:32:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9eaf02717f28579f69cb26864d3169b2.vir.sys 18304  9eaf02717f28579f69cb26864d3169b2 
010c4a012f56cb10023d5b79afe4604d.vir.exe 799232 1, 15, 1, 811010c4a012f56cb10023d5b79afe4604d 
b42e38f89be005a1de0339fce7fc5d11.exe 806400 1, 15, 1, 1415b42e38f89be005a1de0339fce7fc5d11 
de007acc50e9a95dee9a56e386f6decd.vir.exe 813056 1, 15, 1, 1611de007acc50e9a95dee9a56e386f6decd 
2173c676683fced23297c936e4e1d554.vir.exe 813056 1, 15, 1, 16112173c676683fced23297c936e4e1d554 
0db26060481d9a83df2a2eff3408755a.vir.exe 788992 1, 15, 1, 4110db26060481d9a83df2a2eff3408755a 
1ae608304cc9bb506dd5eb3347c9117b.vir.exe 788992 1, 15, 1, 4111ae608304cc9bb506dd5eb3347c9117b 
10654bf1aa071b5200c2f7dc8bda5489.vir.exe 788992 1, 15, 1, 41110654bf1aa071b5200c2f7dc8bda5489 
0f3ad0836dfefb6d8fe4e2b04e36409e.vir.exe 788992 1, 15, 1, 4110f3ad0836dfefb6d8fe4e2b04e36409e 
17c402c8149a9bc33b3b9362c0a042d3.vir.exe 788992 1, 15, 1, 41117c402c8149a9bc33b3b9362c0a042d3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware