Home / Spyware Encyclopedia / Rootkit.Agent.bkkd << Back

Recommendation to Automatically remove Rootkit.Agent.bkkd


Our products can remove Rootkit.Agent.bkkd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bkkd Details


  • Category Rootkit
  • Discovered 4/1/2011 1:12:09 PM
  • Modified 8/9/2023 3:11:15 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
590215a3722b8f1760390f10215cef29.dll 122880  590215a3722b8f1760390f10215cef29 
eb6d96cc676e9bf2b9a09eb2d573b91a.vir.dll 32768  eb6d96cc676e9bf2b9a09eb2d573b91a 
dcf9fde0c35ec4068a55ad3321d85d03 11776  dcf9fde0c35ec4068a55ad3321d85d0309/08/2023
dcf9fde0c35ec4068a55ad3321d85d03.dll 11776  dcf9fde0c35ec4068a55ad3321d85d0309/08/2023
a1df7d3348e481d4b394e4890f5fabd90001ff1d.bin.exe 104768  bbc7d08471f94c3cc110a736842ed9d6 
dd12e662a0fdc52c17148ca50cc5c18da0b844fac8853d47d1eeed0492f7ab26.exe 10240  b14a01e408ab12efcf703ebb57e360d4 
8a125432123b92558e818fa2c4c29fdae34247b8a6480b4e5813fe608908736e.exe 10240  b24a9fca68bd04ba3ecf89b82f7403dc 
cfb32ff9058d310460ec174a401931d874c604f3b08d903da4d9827b36aab3af.exe 10240  f01b23f40da9034b6e03d826941f7483 
e956390ad0b4127160401f7f90fd1217.dll.exe 10240  e956390ad0b4127160401f7f90fd1217 
adfdae24b6d32f1b7844e4ba5b445a9b.dll.exe 10240  adfdae24b6d32f1b7844e4ba5b445a9b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware