Home / Spyware Encyclopedia / Rootkit.Agent.iey << Back

Recommendation to Automatically remove Rootkit.Agent.iey


Our products can remove Rootkit.Agent.iey and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.iey Details


  • Category Rootkit
  • Discovered 1/22/2010 1:25:39 PM
  • Modified 8/1/2023 4:12:26 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8cec45bacd54a47d260c55d08b18e44f.vxe.exe 47616  8cec45bacd54a47d260c55d08b18e44f 
c545fe4dc4235cf734cf7fc8b135ae0b.exe 677376  c545fe4dc4235cf734cf7fc8b135ae0b 
73f416d674be22779ba5a5628e1096ece98581c71bf9d53ed0c05bdd153a20fa.exe 37888  2bf82111b3d69bb4b16fcf56004ce2f5 
94e8efa7bb99a2be50a35a75bdeab0cbe7b8899ed32ff9eb58a10ddd02e780f7.exe 252701 1.0024ce5871bf7ff7abe63703587b3b4fc6 
0022c9c04174a1bb26ebfae8d7b5f39aeaf2788023d33fa679753234c5d9e732.exe 37888  af2593262f2d9ae64862058e41802f85 
3d5c342879d4764977ce9c225280203c.exe 37888  97d33a4d9970f7ecf4577e2e5a0156ef 
75deaf30438793a56379a35492168ea1.exe 627712  75deaf30438793a56379a35492168ea1 
da1977f02e9a7789daf11acd09e433f3.vir.exe 818688  da1977f02e9a7789daf11acd09e433f3 
ac0908d8635bd61bc9aa7276baf6a636.vxe.exe 37888  ac0908d8635bd61bc9aa7276baf6a636 
00b2b6f1b67f425ff13051cb6edc2571.vir.exe 667136  00b2b6f1b67f425ff13051cb6edc2571 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware