Home / Spyware Encyclopedia / Rootkit.Agent.dh << Back

Recommendation to Automatically remove Rootkit.Agent.dh


Our products can remove Rootkit.Agent.dh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dh Details


  • Category Rootkit
  • Discovered 6/17/2011 10:54:31 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
81E78812.EXE 29334  373e633b8c77902e0982706a7163a6bb 
rootkit.win32.agent.dh 29348  970b518742997c4a9947a76b6f2491e1 
eb923f297999e8e9e0e312a32956ecd836f367a6.{pe}.exe 5859  e0eaefd7f8aa2b8563dd84c52bcf1263 
a5cf518e334235ff304f73b933c8cc67.exe 5811  a5cf518e334235ff304f73b933c8cc67 
c4a34a2eb08e2c844cf9fd2b3baa1431.exe 5892  c4a34a2eb08e2c844cf9fd2b3baa1431 
0a348bd365323e61662a8830b3f40b9e.exe 5562  0a348bd365323e61662a8830b3f40b9e 
7add8e98ae27efd6d6768fa9bd74d5d7.exe 44256  7add8e98ae27efd6d6768fa9bd74d5d7 
ab57be72f0096b4ebdc34a8c66e40ab8d23d01166d47adf4e252100d1848052d.exe 5667  cf595bf93773ea9f1db5bee20c96d939 
e3fca2d04696958d2ff46e6f693b5478.vir.exe 31998  e3fca2d04696958d2ff46e6f693b5478 
9191455ca6439827781981609cca8b6a070cc977dac852e6c376bc68d9a6c9e2.exe 5853  ce751d45c5bf66a962fb0cefc8a410e6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware