Home / Spyware Encyclopedia / Rootkit.Agent.egyk << Back

Recommendation to Automatically remove Rootkit.Agent.egyk


Our products can remove Rootkit.Agent.egyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egyk Details


  • Category Rootkit
  • Discovered 11/6/2016 4:52:44 AM
  • Modified 11/7/2016 12:02:57 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e7faa2152c3e9109db6355eb2592cfb0.vir.exe 247623  e7faa2152c3e9109db6355eb2592cfb0 
0c907a58f41d68aedffa7c1d357d1cb6.vir.exe 218983  0c907a58f41d68aedffa7c1d357d1cb6 
a40618219b1c4dc063d3f5eb23bd6b14.vir.exe 244428  a40618219b1c4dc063d3f5eb23bd6b14 
7af7122a50ccfd633c5f40815522d233.vir.exe 255855  7af7122a50ccfd633c5f40815522d233 
e96548800d7d96094852578684297487.vir.exe 282858  e96548800d7d96094852578684297487 
29f4e68c86f09081a696c3cd996cf1c1.vir.exe 289562  29f4e68c86f09081a696c3cd996cf1c1 
45fdcc3d90e27480e4681601103765ff.vir.exe 292601  45fdcc3d90e27480e4681601103765ff 
13209a97aad4d2a00a572f47a27246b4_sample.exe 296177  13209a97aad4d2a00a572f47a27246b4 
f1772f47e921f46f97bf1bfd2ddd8293.exe 299121  f1772f47e921f46f97bf1bfd2ddd8293 
128e6359e73b92453021c179ee47eb99.vir.exe 310337  128e6359e73b92453021c179ee47eb99 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware