Home / Spyware Encyclopedia / Rootkit.Agent.kp << Back

Recommendation to Automatically remove Rootkit.Agent.kp


Our products can remove Rootkit.Agent.kp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.kp Details


  • Category Rootkit
  • Discovered 8/31/2011 10:39:37 PM
  • Modified 3/12/2024 12:54:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
168f396e.exe 5248  7f43dfb8b58025b3f03b35845995c3a0 
0e6a2891.exe 5248  2367c30e4c0488913dbf5aa0e57dee7a 
1e8ed68771b1691d4efdefd2328a2b9c.sys 5248  1e8ed68771b1691d4efdefd2328a2b9c 
3674085e7925f18372d84580bca266554186b186732c6783685eb90cfa50e988.sys 5248  10feb457ca9fbf588887fad3ac2752d4 
c4e67fe7b43c70d30f602c51c71f8ad205fc867937184ac09f4f8f4805caf5b3.sys 5248  09668420c51093066edf035f542d8aef 
168f396e.exe 5248  7f43dfb8b58025b3f03b35845995c3a016/07/2020
632f18c8e32ccb39e6b27c33e687d491.sys 5248  632f18c8e32ccb39e6b27c33e687d49112/03/2024
598d34436ec2887a31f30d5b01e075eb.vir.sys 5248  598d34436ec2887a31f30d5b01e075eb 
d10bc8aaa072e94af31efb135fc95900d2dc9c98811e2a81001f7c1464cf4aa9.sys 5248  0aa7015ed06b310cd72ae884ad3b0963 
6cd8e69b3ed803fa513f74b7fe7f3d740ccd523b3aa8febe99a364731048d815.sys 5248  b0d411111451f7d4a3e702795bd1e0d7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware