Home / Spyware Encyclopedia / Rootkit.Agent.dhkp << Back

Recommendation to Automatically remove Rootkit.Agent.dhkp


Our products can remove Rootkit.Agent.dhkp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhkp Details


  • Category Rootkit
  • Discovered 6/14/2013 11:20:14 AM
  • Modified 7/2/2014 11:26:15 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
18375204531d0a01d41e95f1cb37afdb15115b9a7651fa0d658a3aa56589c6bdef3fdaf864d398a85775e5588be9d.sys 13224  daa585f90b8852f25d5255ebcbcf0cda 
b76e3677f0da82870e7f9acdf1310132.vir.sys 13224  b76e3677f0da82870e7f9acdf1310132 
d265cc1e6ff266251f349f8e503b0788.vir.sys 13224  d265cc1e6ff266251f349f8e503b0788 
32f5a46e68aca6cda47972171a020831.vir.sys 13224  32f5a46e68aca6cda47972171a020831 
183220025043f026eb4c9c87d1abb9aa7dffc7d71f1839ffa066eb4d20e44c78dff17d609a19a8df7a06a8cc94171.sys 13224  938d1e121cb7b80022143e96ed21319c 
8d3ab5b428ad9fffab7ec7da6ea4832e.vir.sys 13224  8d3ab5b428ad9fffab7ec7da6ea4832e 
df0446164f497cffa61fb3529d72b7fb.vir.sys 13224  df0446164f497cffa61fb3529d72b7fb 
7e412d81b5c32d21c10be7b23f8e635e.vir.sys 13224  7e412d81b5c32d21c10be7b23f8e635e 
31c1a6a400df2250f03055cd09477d10.vir.sys 13224  31c1a6a400df2250f03055cd09477d1018/07/2023
2b9dca76740be268d9900c96cd4e8067.vir.sys 13224  2b9dca76740be268d9900c96cd4e8067 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware