Home / Spyware Encyclopedia / Rootkit.Agent.elyk << Back

Recommendation to Automatically remove Rootkit.Agent.elyk


Our products can remove Rootkit.Agent.elyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.elyk Details


  • Category Rootkit
  • Discovered 7/19/2022 11:33:32 AM
  • Modified 7/19/2022 2:16:35 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
20191206231450333358.exe 17464  6d7f9bde12192582d5deaf08c2c2523f10/12/2019
sbiedrv.sys.exe 167016Sandboxie Holdings, LLC5.18b92502da2a4b80cbeb1ce067baed515405/02/2020
ac2a19aca3de819ae17c3944b0efc680.vir.exe 197800  ac2a19aca3de819ae17c3944b0efc68004/06/2020
1059-3e63e229a218877e7a74e400d0fa69459f7e3efe.exe 197800  e11032a4f735e8b35a2ef430de297d7d06/06/2020
1065-ede1197fdc46507bbbf4ffc3a74c0d7ad7a84a5a.exe 153704  010e0ee9467f919ee420691e3b3cccdd22/01/2021
b917471ca85f360fb4bc1b7e912670d291a4bbdcc95d746ef21030ca345c4c50_sample.exe 14904  81f88303dda386c8ce36dca6f8d6544d27/03/2021
d5eb3b36aea9a42b25b7bf4f67c8cbd0.vir.exe 189032  d5eb3b36aea9a42b25b7bf4f67c8cbd011/05/2021
edba71b57744ab0570cce702b55306dd939fec5cfe0d8a34df5a981c23761606_sample.exe 2666040  5565b59e94190318dbe933875101f16710/06/2021
6be587cff06765a10c7183d607ef098a.exe 11320  6be587cff06765a10c7183d607ef098a01/12/2021
649bde94df78b0671a067afa50f8f3c6.exe 12344  649bde94df78b0671a067afa50f8f3c602/02/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware