Home / Spyware Encyclopedia / Rootkit.Agent.dhhx << Back

Recommendation to Automatically remove Rootkit.Agent.dhhx


Our products can remove Rootkit.Agent.dhhx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhhx Details


  • Category Rootkit
  • Discovered 7/7/2013 9:16:20 AM
  • Modified 3/25/2015 3:25:42 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cc701716943bd8390519fadde8d461b5.vir.sys 8480  cc701716943bd8390519fadde8d461b5 
c3212bcfe21936aea4db550ee6172365.vir.sys 32768  c3212bcfe21936aea4db550ee6172365 
95917fd27062780707db3a2113478b13.vir.sys 8480  95917fd27062780707db3a2113478b13 
fc80dc538b5e6b820becf519d6406cd8.vir.sys 8480  fc80dc538b5e6b820becf519d6406cd8 
994b885b46ee22c824adddb169758fe4.vir.sys 8480  994b885b46ee22c824adddb169758fe4 
218cdab8237eeadb86e5a1c6d78eb968.vir.exe 94208Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0218cdab8237eeadb86e5a1c6d78eb968 
ad4bbf61753e4d28b76ef351a71ef559.vir.sys 8480  ad4bbf61753e4d28b76ef351a71ef559 
9b18ece5bc6ba286fb7ca616294a296b.vir.exe 147456Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 09b18ece5bc6ba286fb7ca616294a296b 
101e9f483421e50682ea3d12b06fdda8.vir.exe 93516Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0101e9f483421e50682ea3d12b06fdda8 
203f87f9592a9e44208b283dc614dd3e.vir.sys 16384  203f87f9592a9e44208b283dc614dd3e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware