Home / Spyware Encyclopedia / Rootkit.Agent.dh << Back

Recommendation to Automatically remove Rootkit.Agent.dh


Our products can remove Rootkit.Agent.dh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dh Details


  • Category Rootkit
  • Discovered 6/17/2011 10:54:31 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.dh 29348  970b518742997c4a9947a76b6f2491e1 
9e9fcc5ae6b8b711ab6c8e372ac2181d5074bd97.{pe}.exe 5880  bbcca52e1268a2d3a98f7a78fec547c0 
eb923f297999e8e9e0e312a32956ecd836f367a6.{pe}.exe 5859  e0eaefd7f8aa2b8563dd84c52bcf1263 
a5cf518e334235ff304f73b933c8cc67.exe 5811  a5cf518e334235ff304f73b933c8cc67 
f9dcc1de5b3675019c8625c548415768f93cb25ae6d8ef553c8eece3dbd27432.exe 55120  1c69cd3ecd2a0e15cdeed1c9d61efe89 
e548f6e03d96d67e122c76bc40e2c6de.exe 5895  e548f6e03d96d67e122c76bc40e2c6de 
f295f5224d63e91931bd466b5cd8d12b.exe 5697  f295f5224d63e91931bd466b5cd8d12b 
c4a34a2eb08e2c844cf9fd2b3baa1431.exe 5892  c4a34a2eb08e2c844cf9fd2b3baa1431 
f9aeb716e3960cb6ea5cbd84064d1f4a.exe 5670  f9aeb716e3960cb6ea5cbd84064d1f4a 
0a348bd365323e61662a8830b3f40b9e.exe 5562  0a348bd365323e61662a8830b3f40b9e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware