Home / Spyware Encyclopedia / Rootkit.Agent.egyk << Back

Recommendation to Automatically remove Rootkit.Agent.egyk


Our products can remove Rootkit.Agent.egyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.egyk Details


  • Category Rootkit
  • Discovered 11/6/2016 4:52:44 AM
  • Modified 11/7/2016 12:02:57 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e96548800d7d96094852578684297487.vir.exe 282858  e96548800d7d96094852578684297487 
f1772f47e921f46f97bf1bfd2ddd8293.exe 299121  f1772f47e921f46f97bf1bfd2ddd8293 
351b6308e33bc536a45fe2b30968eef8.vir.exe 339349  351b6308e33bc536a45fe2b30968eef8 
8331b34572b66b5c514c2fc59c2e8f77.vir.exe 330185  8331b34572b66b5c514c2fc59c2e8f77 
1f15b3dd9c7d063d109595c2a534b76a.vir.exe 348549  1f15b3dd9c7d063d109595c2a534b76a 
3dfd91d7f2681aa1d79fabf0e30b9811.mal.exe 359873  3dfd91d7f2681aa1d79fabf0e30b9811 
b556204106714f923ce5fb31d49ec15c2b1582cd.bin.exe 353817  5b52c8cd999a7c47babab90f389d0ace 
c7272dddce19cdc3abf5d7271309d01a.vir.sys 16128  c7272dddce19cdc3abf5d7271309d01a 
b5030e482211744965ac9bed93e4a83a.vir.exe 369087  b5030e482211744965ac9bed93e4a83a 
a43210145235133df28d13d15a9bc05a.mal.exe 372750  a43210145235133df28d13d15a9bc05a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware