Home / Spyware Encyclopedia / Rootkit.Agent.bhmp << Back

Recommendation to Automatically remove Rootkit.Agent.bhmp


Our products can remove Rootkit.Agent.bhmp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bhmp Details


  • Category Rootkit
  • Discovered 6/28/2013 3:50:03 AM
  • Modified 6/1/2020 1:50:10 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
66c934f0.sys 6496  9f0b3ee2c34cc7533daaf465a340423a 
5aa8299f.sys 6496  9f0b3ee2c34cc7533daaf465a340423a 
21400c00.sys 6496  9f0b3ee2c34cc7533daaf465a340423a 
e12e3cf827e96dd7a99c597c44fc0258.vir.exe 83860Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0e12e3cf827e96dd7a99c597c44fc0258 
af11d0f3425d0762c57de429dac7ebb1.vir.exe 83860Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0af11d0f3425d0762c57de429dac7ebb1 
d4d3cd15e3e06535f4e6f7bc57fd10b0.vir.exe 78694Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0d4d3cd15e3e06535f4e6f7bc57fd10b0 
e7050369aecdf93555b6e14056e47d5b.exe 83860Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0e7050369aecdf93555b6e14056e47d5b 
636fea18a8487638419722e8357d23ba.vir.exe 84372Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0636fea18a8487638419722e8357d23ba 
705c2c4dcdcb24ff6b510be774b8670b.vir.exe 83860Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0705c2c4dcdcb24ff6b510be774b8670b 
37b77ac2.sys 6496  9f0b3ee2c34cc7533daaf465a340423a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware