Home / Spyware Encyclopedia / Rootkit.Agent.amy << Back

Recommendation to Automatically remove Rootkit.Agent.amy


Our products can remove Rootkit.Agent.amy and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.amy Details


  • Category Rootkit
  • Discovered 11/18/2013 10:14:47 PM
  • Modified 7/27/2023 4:45:30 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
af2b99d8e1ef4ebc0bf39a5795e2a2a6.vir.exe 86016  af2b99d8e1ef4ebc0bf39a5795e2a2a627/07/2023
9cfb8e3923172ccc310219eae9f8f1b60aabe4ecf5fe76f71a0753db5cec2d76.sys 5936  ae3d4fd25ff4e4d5787950a318f249b503/09/2020
4990f5fa071598618b2f9ce2b6019715.vxe.exe 446464PPLive Corporation3,1,2,60054990f5fa071598618b2f9ce2b601971502/05/2020
9b7912431d96e3d896f6b4295dfe4b4d.vir.sys 2176  9b7912431d96e3d896f6b4295dfe4b4d 
af2b99d8e1ef4ebc0bf39a5795e2a2a6.vir.exe 86016  af2b99d8e1ef4ebc0bf39a5795e2a2a6 
304b2dd8746447f21132186c0dac342d.exe 86950  304b2dd8746447f21132186c0dac342d 
4990f5fa071598618b2f9ce2b6019715.vxe.exe 446464PPLive Corporation3,1,2,60054990f5fa071598618b2f9ce2b6019715 
9cfb8e3923172ccc310219eae9f8f1b60aabe4ecf5fe76f71a0753db5cec2d76.sys 5936  ae3d4fd25ff4e4d5787950a318f249b5 
c72bc03f3e2aac315153fe26ecbbf00e.exe 82432  c72bc03f3e2aac315153fe26ecbbf00e 
hidepr.sys 2176  13dd6728aeab4ea920b46460fd74938e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware