Home / Spyware Encyclopedia / Rootkit.Agent.acj << Back

Recommendation to Automatically remove Rootkit.Agent.acj


Our products can remove Rootkit.Agent.acj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.acj Details


  • Category Rootkit
  • Discovered 4/23/2013 4:07:06 PM
  • Modified 2/19/2024 11:36:45 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c87c32551ea66f97f3884b1a42edc2ab.vxe.exe 51193  c87c32551ea66f97f3884b1a42edc2ab 
c6a4ac15c859cd04d520fdfa0a71cdf0.vir.exe 48121  c6a4ac15c859cd04d520fdfa0a71cdf0 
e5d9983c6c928db5ba1b1579bfc6f822.exe 31719  e5d9983c6c928db5ba1b1579bfc6f82222/07/2020
12d1c766ae78b98423fe09dfd4b13219.vir.exe 31719  12d1c766ae78b98423fe09dfd4b13219 
152051075579877020d3114e0824e51332613888d2c5dfb97dd7d8975faa1ed3d9377d0874ec42eebffdea0cea166.exe 13428  8d5c1a5755fb6b0343db7df59afcb3f0 
16352506072d8473b823e987dba2f8506ffa7fbba0600d857fb2ebbdbddcc08572d1031f6a51d7cabc09f7624c1f8.exe 24551  25fe4ffa2e0b19097409e2d522f6f9dd 
e5d9983c6c928db5ba1b1579bfc6f822.exe 31719  e5d9983c6c928db5ba1b1579bfc6f822 
6103e7175c3f67fed81d1c002199fde4.exe 51705  6103e7175c3f67fed81d1c002199fde4 
97e21c6a2bfa0d09a50c48b0e03cbbbc.exe 51705  97e21c6a2bfa0d09a50c48b0e03cbbbc 
71b648d200dfce8911d05a1f9ae88f85.exe 51705  71b648d200dfce8911d05a1f9ae88f85 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware