Home / Spyware Encyclopedia / Rootkit.Agent.dh << Back

Recommendation to Automatically remove Rootkit.Agent.dh


Our products can remove Rootkit.Agent.dh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dh Details


  • Category Rootkit
  • Discovered 6/17/2011 10:54:31 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.dh 29348  970b518742997c4a9947a76b6f2491e1 
9e9fcc5ae6b8b711ab6c8e372ac2181d5074bd97.{pe}.exe 5880  bbcca52e1268a2d3a98f7a78fec547c0 
eb923f297999e8e9e0e312a32956ecd836f367a6.{pe}.exe 5859  e0eaefd7f8aa2b8563dd84c52bcf1263 
f295f5224d63e91931bd466b5cd8d12b.exe 5697  f295f5224d63e91931bd466b5cd8d12b 
2a01d2f83a321d649ac4955c4f5b8bdd69b2ec1453a373d345267a3ed54f97b4.exe 5904  ebf072b93b0a8b18cdfefdbaa6c1ab74 
ab57be72f0096b4ebdc34a8c66e40ab8d23d01166d47adf4e252100d1848052d.exe 5667  cf595bf93773ea9f1db5bee20c96d939 
0a348bd365323e61662a8830b3f40b9e.exe 5562  0a348bd365323e61662a8830b3f40b9e 
7add8e98ae27efd6d6768fa9bd74d5d7.exe 44256  7add8e98ae27efd6d6768fa9bd74d5d7 
d1f0d6809dc49a2a15134c0556656bcc.exe 5865  d1f0d6809dc49a2a15134c0556656bcc 
222ca4151ac97cfb9cdfcd4543bc4784.vir.exe 5799  222ca4151ac97cfb9cdfcd4543bc4784 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware