A program or set of programs which hides itself by subverting or evading the computer's security mechanisms, then allows remote users to secretly control the computer's operating system.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More scanning & removal options
More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Rootkit:W32/Agent.UI creates a device named "\Device\IWEUFHKSEF" and sets up symbolic link named "\??\IWEUFHKSEF" to accept control codes from usermode programs.
It removes all hooked addresses corresponding to all NTFuntions (which are implemented in Ntoskrnl.exe), then restores them to their original values.
See the Hupigon.OGA description for additional details.