Click on screenshot to zoom
Danger level 8
Type: Trojans
Common infection symptoms:
  • Connects to the internet without permission
  • Slow internet connection
  • System crashes
  • Slow Computer

Rootkit.Agent.NIZ

Rootkit.Agent.NIZ in not your typical infection. Rootkit.Agent.NIZ is another Trojan infection, designed to compromise your computer system. Rootkit.Agent.NIZ enters into a system via browser security exploits.

Rootkit.Agent.NIZ is referred to by a variety of names:
- R/Drop.Rootkit.A.2
- Trojan.Rootkit.Agent.Eq
- Rootkit.Agent.CL
- Rootkit.Win32.Agent.eq
- W32/Agent.EQ!tr.rkit
- Win32/Rootkit.Agent.EQ
- W32/Rootkit.AAY
- Trojan.Win32.Rootkit.Agent.EQ

This type of infection will only be the cause of more and more pop-up messages - as it further compromises the integrity of any PC system it has entered.

Rootkit.Agent.NIZ will covertly install itself onto a system, and will attach itself to the registry of the infiltrated system, where it will then build a backdoor, allowing for the entrance of additional malware, and allowing a remote attacker to infiltrate the computer system, at any given time.

Rootkit.Agent.NIZ will also apply Rootkit tactics, in order to remain hidden from the infiltrated computer systems’ user, anti-virus and anti-spyware programs.
As is typical of Trojan infections, Rootkit.Agent.NIZ installs itself covertly onto a computer system, usually via the downloading of email attachments, which could be in any of the following formats: .avi, .pif, .exe, .jpg.

It is important to make note of the methods employed by Rootkit.Agent.NIZ to enter into a computer system:

1. Via unexpected email attachment, therefore one should never open up unexpected email attachments, instead check with the sender first, to ensure that the attachment is legitimate.
2. Via Browser security exploits, which one may come across while surfing the web.
3. Via Instant Messenger applications. If an effective firewall is not in place on the computer system, spyware may be capable of attaching itself to any files shared with the instant messenger.

Rootkit.Agent.NIZ is a complex form of Trojan infection, in the fact that it is capable of recreating, repairing and updating itself within an infected computer system, all as a ploy to remain undetected by the systems security applications. Should Rootkit.Agent.NIZ alter, restore or update it files, DLLs, registry keys and processes, a system scanner may be capable of removing certain components associated with Rootkit.Agent.NIZ, but chances are the Trojan will begin procedures to repair and update itself. The best thing to do would be to manually remove this infection as soon as possible.

In order to protect your system against the threat of Rootkit.Agent.NIZ, there are 4 main rules you should adhere to:

• Rule 1:
Keep your Windows up to date. (Tip: Regularly visit Windows Update and set your PC to receive security and critical updates automatically)

• Rule 2:
Download and install a reliable anti-spyware program, one that will recognise the current form of Rootkit.Agent.NIZ, a well as other forms of spyware.

• Rule 3:
Install a firewall onto your system, and keep it turned on. A firewall is essential for complete protection for your system.

• Rule 4:
Keep the definitions in your anti-spyware up to date at all times.

One thing you should make sure you do – delete this dangerous infection from your computer system, as soon as you have detected any malicious activity. Good luck!

Download Spyware Removal Tool to Remove* Rootkit.Agent.NIZ
  • Quick & tested solution for Rootkit.Agent.NIZ removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Rootkit.Agent.NIZ

Files associated with Rootkit.Agent.NIZ infection:

ddnt.sys
7A.tmp
EagleH.dll
amd64si.sys
senekanxdoyeyp.sys
senekaddipwvik.sys
ws2_32sik.sys
pcmstub.sys
tni30.tmp
senekarsvxfmle.sys
ztrdrpkz.sys
ati64si.sys
f6fc7f835c3f73b8f93ab0b12a0efd4d.sys
tni92.tmp
sdpiosys.sys
i386si.sys
autochk.dll

Rootkit.Agent.NIZ DLL's to remove:

EagleH.dll
autochk.dll

Remove Rootkit.Agent.NIZ registry entries:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\amd64si
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ati64si
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ddnt
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\f6fc7f835c3f73b8f93ab0b12a0efd4d
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\hzrbshli
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\pcmstub
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\sdpiosys
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\seneka
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TnIDriver
RUNNING PROGRAM\explorer.exe
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.