Home / Spyware Encyclopedia / Rootkit.Agent.dhkp << Back

Recommendation to Automatically remove Rootkit.Agent.dhkp


Our products can remove Rootkit.Agent.dhkp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhkp Details


  • Category Rootkit
  • Discovered 6/14/2013 11:20:14 AM
  • Modified 7/2/2014 11:26:15 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a224f34259cb2d8698e871ef8c48696.vir.sys 13224  4a224f34259cb2d8698e871ef8c48696 
d265cc1e6ff266251f349f8e503b0788.vir.sys 13224  d265cc1e6ff266251f349f8e503b0788 
898d5f337f729972c8cbfcd72ffb7d6c.vir.sys 13224  898d5f337f729972c8cbfcd72ffb7d6c 
31c1a6a400df2250f03055cd09477d10.vir.sys 13224  31c1a6a400df2250f03055cd09477d1018/07/2023
7e412d81b5c32d21c10be7b23f8e635e.vir.sys 13224  7e412d81b5c32d21c10be7b23f8e635e 
8d3ab5b428ad9fffab7ec7da6ea4832e.vir.sys 13224  8d3ab5b428ad9fffab7ec7da6ea4832e 
df0446164f497cffa61fb3529d72b7fb.vir.sys 13224  df0446164f497cffa61fb3529d72b7fb 
2b9dca76740be268d9900c96cd4e8067.vir.sys 13224  2b9dca76740be268d9900c96cd4e8067 
21182d6c34d9ce5e874b5906e53170d8.vir.sys 13224  21182d6c34d9ce5e874b5906e53170d8 
17324006555a15181736a81bbe63e35770e837d8324238833f7cb6e884b962229c5fd5044fa5fb086bb3db3b30da8.sys 13224  9f295d271713545ffb19492a01f64e2a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware