Home / Spyware Encyclopedia / Rootkit.Agent.dhkp << Back

Recommendation to Automatically remove Rootkit.Agent.dhkp


Our products can remove Rootkit.Agent.dhkp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhkp Details


  • Category Rootkit
  • Discovered 6/14/2013 11:20:14 AM
  • Modified 7/2/2014 11:26:15 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a224f34259cb2d8698e871ef8c48696.vir.sys 13224  4a224f34259cb2d8698e871ef8c48696 
31c1a6a400df2250f03055cd09477d10.vir.sys 13224  31c1a6a400df2250f03055cd09477d10 
18375204531d0a01d41e95f1cb37afdb15115b9a7651fa0d658a3aa56589c6bdef3fdaf864d398a85775e5588be9d.sys 13224  daa585f90b8852f25d5255ebcbcf0cda 
b76e3677f0da82870e7f9acdf1310132.vir.sys 13224  b76e3677f0da82870e7f9acdf1310132 
d265cc1e6ff266251f349f8e503b0788.vir.sys 13224  d265cc1e6ff266251f349f8e503b0788 
32f5a46e68aca6cda47972171a020831.vir.sys 13224  32f5a46e68aca6cda47972171a020831 
183220025043f026eb4c9c87d1abb9aa7dffc7d71f1839ffa066eb4d20e44c78dff17d609a19a8df7a06a8cc94171.sys 13224  938d1e121cb7b80022143e96ed21319c 
733d9074ccb7d86dcb00b31a274aa1c3.vir.sys 13224  733d9074ccb7d86dcb00b31a274aa1c3 
898d5f337f729972c8cbfcd72ffb7d6c.vir.sys 13224  898d5f337f729972c8cbfcd72ffb7d6c 
17324006555a15181736a81bbe63e35770e837d8324238833f7cb6e884b962229c5fd5044fa5fb086bb3db3b30da8.sys 13224  9f295d271713545ffb19492a01f64e2a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware