Home / Spyware Encyclopedia / Rootkit.Agent.elyk << Back

Recommendation to Automatically remove Rootkit.Agent.elyk


Our products can remove Rootkit.Agent.elyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.elyk Details


  • Category Rootkit
  • Discovered 7/19/2022 11:33:32 AM
  • Modified 7/19/2022 2:16:35 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
20191206231450333358.exe 17464  6d7f9bde12192582d5deaf08c2c2523f10/12/2019
94901f94c1002f1b0042203d72c49344.exe 17464  94901f94c1002f1b0042203d72c4934411/12/2019
20191209145825808784.exe 17464  3863af954c989baca97d4d89883f9a1c12/12/2019
sbiedrv.sys.exe 167016Sandboxie Holdings, LLC5.18b92502da2a4b80cbeb1ce067baed515405/02/2020
ac2a19aca3de819ae17c3944b0efc680.vir.exe 197800  ac2a19aca3de819ae17c3944b0efc68004/06/2020
1059-3e63e229a218877e7a74e400d0fa69459f7e3efe.exe 197800  e11032a4f735e8b35a2ef430de297d7d06/06/2020
1065-ede1197fdc46507bbbf4ffc3a74c0d7ad7a84a5a.exe 153704  010e0ee9467f919ee420691e3b3cccdd22/01/2021
b917471ca85f360fb4bc1b7e912670d291a4bbdcc95d746ef21030ca345c4c50_sample.exe 14904  81f88303dda386c8ce36dca6f8d6544d27/03/2021
1059-efd7d6cd3bc4336abc46e1fee3fe0ee0bf048123.exe 190008  705f42753a31a99078d1c50861f0942514/04/2021
ba94cdd643c52efec18f24606ea2bae64c74a3db92a6c725365211881aae79ba_sample.exe 14904  aa1b166f2103fea6fbe6af7446250b3611/05/2021

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware