Home / Spyware Encyclopedia / Rootkit.TDSS.rhu << Back

Recommendation to Automatically remove Rootkit.TDSS.rhu


Our products can remove Rootkit.TDSS.rhu and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.rhu Details


  • Category Rootkit
  • Discovered 6/26/2010 3:04:33 PM
  • Modified 7/10/2023 6:30:16 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
dfeeec06.dll 37888  2fd42d0d9faef976025233b55fbdd485 
4386b1f74e3f4c731c12a926de41b65fb3b54b38.bin.exe 48640  0d8570cd299c51362574103b60e4318d 
a95f3f53a1b207f0a3d22ea41611d141.exe 46080YY Inc.4.17.0.4a95f3f53a1b207f0a3d22ea41611d141 
c9ebbcc398881bab67cc4f86f129fba4.vxe.exe 266240 1, 0, 0, 1c9ebbcc398881bab67cc4f86f129fba4 
f3b3edda8de6929d6f390b9ccefbc9dc.exe 47616广州多玩信息技术有限公司2012,09,10,3758f3b3edda8de6929d6f390b9ccefbc9dc 
7c00161e02cddf579fd93ae3da3a33ed52cb0773f828051942b8eacff3370c68.exe 46080YY Inc.4.17.0.4b8c4b45607c4684fdf354c3901a2a4ac 
4e85be4a9fa4fbeda0a465429d0f87a99dfa336cd023ea23593576d72bbe1851.exe 102400  2524b116096ceca72b741b9452bbe30c 
0eb6fc6b0750f68d1032febbe756b759.exe 48640  0eb6fc6b0750f68d1032febbe756b759 
331d896382690a52229a1b3884378c2b.vxe.exe 266240 1, 0, 0, 1331d896382690a52229a1b3884378c2b 
cd9bdc6bce0890edda8391aca9ff6b35.exe 46080YY Inc.4.17.0.4cd9bdc6bce0890edda8391aca9ff6b35 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware