Home / Spyware Encyclopedia / Rootkit.Agent.dhkp << Back

Recommendation to Automatically remove Rootkit.Agent.dhkp


Our products can remove Rootkit.Agent.dhkp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhkp Details


  • Category Rootkit
  • Discovered 6/14/2013 11:20:14 AM
  • Modified 7/2/2014 11:26:15 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a224f34259cb2d8698e871ef8c48696.vir.sys 13224  4a224f34259cb2d8698e871ef8c48696 
b76e3677f0da82870e7f9acdf1310132.vir.sys 13224  b76e3677f0da82870e7f9acdf1310132 
18375204531d0a01d41e95f1cb37afdb15115b9a7651fa0d658a3aa56589c6bdef3fdaf864d398a85775e5588be9d.sys 13224  daa585f90b8852f25d5255ebcbcf0cda 
32f5a46e68aca6cda47972171a020831.vir.sys 13224  32f5a46e68aca6cda47972171a020831 
becdef722fe04ea4034aabdbac72cb07.vir.sys 13224  becdef722fe04ea4034aabdbac72cb07 
17324006555a15181736a81bbe63e35770e837d8324238833f7cb6e884b962229c5fd5044fa5fb086bb3db3b30da8.sys 13224  9f295d271713545ffb19492a01f64e2a 
df0446164f497cffa61fb3529d72b7fb.vir.sys 13224  df0446164f497cffa61fb3529d72b7fb 
8d3ab5b428ad9fffab7ec7da6ea4832e.vir.sys 13224  8d3ab5b428ad9fffab7ec7da6ea4832e 
7e412d81b5c32d21c10be7b23f8e635e.vir.sys 13224  7e412d81b5c32d21c10be7b23f8e635e 
31c1a6a400df2250f03055cd09477d10.vir.sys 13224  31c1a6a400df2250f03055cd09477d1018/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware