Home / Spyware Encyclopedia / Rootkit.Agent.egyk << Back

Recommendation to Automatically remove Rootkit.Agent.egyk


Our products can remove Rootkit.Agent.egyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egyk Details


  • Category Rootkit
  • Discovered 11/6/2016 4:52:44 AM
  • Modified 11/7/2016 12:02:57 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e96548800d7d96094852578684297487.vir.exe 282858  e96548800d7d96094852578684297487 
237638081bc48ef019d2dd655f2f8cc4.vir.exe 205462  237638081bc48ef019d2dd655f2f8cc4 
8331b34572b66b5c514c2fc59c2e8f77.vir.exe 330185  8331b34572b66b5c514c2fc59c2e8f77 
351b6308e33bc536a45fe2b30968eef8.vir.exe 339349  351b6308e33bc536a45fe2b30968eef8 
b1a0494bdd4b9ebf677f5958a77c9de0.vir.exe 347311  b1a0494bdd4b9ebf677f5958a77c9de0 
3dfd91d7f2681aa1d79fabf0e30b9811.mal.exe 359873  3dfd91d7f2681aa1d79fabf0e30b9811 
b556204106714f923ce5fb31d49ec15c2b1582cd.bin.exe 353817  5b52c8cd999a7c47babab90f389d0ace 
6ffddd13fa220cae32ddd19fe6e16764.vir.exe 305168  6ffddd13fa220cae32ddd19fe6e16764 
c7272dddce19cdc3abf5d7271309d01a.vir.sys 16128  c7272dddce19cdc3abf5d7271309d01a 
b5030e482211744965ac9bed93e4a83a.vir.exe 369087  b5030e482211744965ac9bed93e4a83a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware