Home / Spyware Encyclopedia / Rootkit.Agent.elyk << Back

Recommendation to Automatically remove Rootkit.Agent.elyk


Our products can remove Rootkit.Agent.elyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.elyk Details


  • Category Rootkit
  • Discovered 7/19/2022 11:33:32 AM
  • Modified 7/19/2022 2:16:35 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1065-ede1197fdc46507bbbf4ffc3a74c0d7ad7a84a5a.exe 153704  010e0ee9467f919ee420691e3b3cccdd22/01/2021
d5eb3b36aea9a42b25b7bf4f67c8cbd0.vir.exe 189032  d5eb3b36aea9a42b25b7bf4f67c8cbd011/05/2021
833de5800ccac397225e8d239f773e070cd4bc48fc01dba98e784ac1bff03583.mrg.exe 101432  ba5bc6f66c8c9713659c9fbe0512967418/05/2022
9100066ab54cb4b8876ae8900f44d0f4ad063e9fd80a68f87fd1333babafb10e.mrg.exe 30264  89cf8e4c5179c020f77af57d6ffbc5d419/07/2022
779f39dde88d27d67ed5ce104ebbca7a.exe 13880  779f39dde88d27d67ed5ce104ebbca7a01/04/2022
156e0f36361ad4438c352758c37f9340.vir.exe 15928  156e0f36361ad4438c352758c37f934029/03/2022
ac2a19aca3de819ae17c3944b0efc680.vir.exe 197800  ac2a19aca3de819ae17c3944b0efc68004/06/2020
20191209145825808784.exe 17464  3863af954c989baca97d4d89883f9a1c12/12/2019
94901f94c1002f1b0042203d72c49344.exe 17464  94901f94c1002f1b0042203d72c4934411/12/2019
d20e00e4754fdabda743bed34a12d78c074f832c4e3cf862b313f41001a0d67f_sample.exe 14392  dd117d6d097cb1b37a192ac10722178d01/06/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware