Home / Spyware Encyclopedia / Rootkit.Agent.aeji << Back

Recommendation to Automatically remove Rootkit.Agent.aeji


Our products can remove Rootkit.Agent.aeji and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.aeji Details


  • Category Rootkit
  • Discovered 2/11/2012 3:40:56 AM
  • Modified 10/7/2024 10:14:44 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9d993dbfc00b0e2a969d51d1b17f3104.vxe.exe 20480Beijing Rising Information Technology Co., Ltd.21.0.0.179d993dbfc00b0e2a969d51d1b17f3104 
1475254570da3872dcc781a5c1130b58.sys 4352  1475254570da3872dcc781a5c1130b58 
973e52e72086eb107471bf487c1ceb9ebb1860f5.sys 4352  4eb57233a4ffc35c5673ecb8483faa57 
5ecd1f65743b62316de4eca48b5be7c5.vxe.exe 26112Beijing Rising Information Technology Co., Ltd.21.0.0.175ecd1f65743b62316de4eca48b5be7c5 
2463cf1deb63b1ff1026226d34598dc9.sys 4352  2463cf1deb63b1ff1026226d34598dc9 
e6bacbf90ef6e353dfbea1b72e5bc600.exe 41472  e6bacbf90ef6e353dfbea1b72e5bc600 
0cc6bbe9781a3ea3e0b2c5ba2c48ef47.sys 8192  0cc6bbe9781a3ea3e0b2c5ba2c48ef47 
a0d73ac26691b6d6ed3740b7dafccbedd9157f62fe1841c9105a3ff56c34387e.sys 7784  a0d437efcfa814eb79fefd4f523073f6 
51e3c9c4113072d1ef9af7da58d317537f63c5130aab3378f9bb2901c98737a8.exe 15872Beijing Rising Information Technology Co., Ltd.21.0.0.173622852be112e9a8833b99bd1b27c05a 
0ed07e0e6f7061ea6b0e455020dd76a3.sys 4352  0ed07e0e6f7061ea6b0e455020dd76a3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware