A program or set of programs which hides itself by subverting or evading the computer's security mechanisms, then allows remote users to secretly control the computer's operating system.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Rootkit:W32/Agent.UI creates a device named "\Device\IWEUFHKSEF" and sets up symbolic link named "\??\IWEUFHKSEF" to accept control codes from usermode programs.It removes all hooked addresses corresponding to all NTFuntions (which are implemented in Ntoskrnl.exe), then restores them to their original values.See the Hupigon.OGA description for additional details.