Home / Spyware Encyclopedia / Rootkit.Agent.egyk << Back

Recommendation to Automatically remove Rootkit.Agent.egyk


Our products can remove Rootkit.Agent.egyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egyk Details


  • Category Rootkit
  • Discovered 11/6/2016 4:52:44 AM
  • Modified 11/7/2016 12:02:57 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0c907a58f41d68aedffa7c1d357d1cb6.vir.exe 218983  0c907a58f41d68aedffa7c1d357d1cb6 
f1772f47e921f46f97bf1bfd2ddd8293.exe 299121  f1772f47e921f46f97bf1bfd2ddd8293 
a8110b7700dafc2a7b3960ff28d3c0cb.vir.exe 409087  a8110b7700dafc2a7b3960ff28d3c0cb 
e8a53135745fec4d4367599f9a122e00.vir.exe 350339  e8a53135745fec4d4367599f9a122e00 
b556204106714f923ce5fb31d49ec15c2b1582cd.bin.exe 353817  5b52c8cd999a7c47babab90f389d0ace 
c7272dddce19cdc3abf5d7271309d01a.vir.sys 16128  c7272dddce19cdc3abf5d7271309d01a 
b5030e482211744965ac9bed93e4a83a.vir.exe 369087  b5030e482211744965ac9bed93e4a83a 
a43210145235133df28d13d15a9bc05a.mal.exe 372750  a43210145235133df28d13d15a9bc05a 
9d4802012a75168f10f2ce68ad7db8ba.vir.exe 356956  9d4802012a75168f10f2ce68ad7db8ba 
188ced511d0312f566d3b70bda409213.vir.exe 355032  188ced511d0312f566d3b70bda409213 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware