Home / Spyware Encyclopedia / Rootkit.Agent.dh << Back

Recommendation to Automatically remove Rootkit.Agent.dh


Our products can remove Rootkit.Agent.dh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dh Details


  • Category Rootkit
  • Discovered 6/17/2011 10:54:31 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.dh 29348  970b518742997c4a9947a76b6f2491e1 
eb923f297999e8e9e0e312a32956ecd836f367a6.{pe}.exe 5859  e0eaefd7f8aa2b8563dd84c52bcf1263 
f295f5224d63e91931bd466b5cd8d12b.exe 5697  f295f5224d63e91931bd466b5cd8d12b 
a12eeb647023bbbe6ff6807249b0cb2a.exe 5859  a12eeb647023bbbe6ff6807249b0cb2a 
2a01d2f83a321d649ac4955c4f5b8bdd69b2ec1453a373d345267a3ed54f97b4.exe 5904  ebf072b93b0a8b18cdfefdbaa6c1ab74 
f9aeb716e3960cb6ea5cbd84064d1f4a.exe 5670  f9aeb716e3960cb6ea5cbd84064d1f4a 
0a348bd365323e61662a8830b3f40b9e.exe 5562  0a348bd365323e61662a8830b3f40b9e 
ab57be72f0096b4ebdc34a8c66e40ab8d23d01166d47adf4e252100d1848052d.exe 5667  cf595bf93773ea9f1db5bee20c96d939 
d8d219d6361caaaa26ce4db029d072478351478a9dccec77629e89d0b7aa28fe.exe 5910  22e1f8c3809727c493c5cfbc3d166df1 
e46b2b604fc27e75b55c5fe06e49e9cb.exe 5880  e46b2b604fc27e75b55c5fe06e49e9cb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware