Home / Spyware Encyclopedia / Rootkit.Agent.bhta << Back

Recommendation to Automatically remove Rootkit.Agent.bhta


Our products can remove Rootkit.Agent.bhta and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bhta Details


  • Category Rootkit
  • Discovered 4/14/2011 5:09:46 PM
  • Modified 7/28/2023 4:05:03 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
335c65dd.sys 8448  83ef1d9f12ad7fee356da81764f9c4df 
1c336c11.sys 8448  83ef1d9f12ad7fee356da81764f9c4df 
4fd71e3e.sys 8448  83ef1d9f12ad7fee356da81764f9c4df 
3a8f6975.sys 8448  83ef1d9f12ad7fee356da81764f9c4df 
8814273fcaad2e512047b22e8bd39d91b98123d10ff68f0bde8eff440e3619f1.sys 16384  e14c494ad066c8a1af58867b927dfc7b 
1929f849a810a66403aee43bc7d7d0c4.vir.exe 89392Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 01929f849a810a66403aee43bc7d7d0c4 
323600fe28a56a4ce59c39517fb4959d.vir.dll 59904Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0323600fe28a56a4ce59c39517fb4959d 
9fe59867e7e297170e9c1d70e63e73a2.vir.sys 16384  9fe59867e7e297170e9c1d70e63e73a2 
db03c3c04548e1f358e7b3ef2d0e802b.vir.dll 71680Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0db03c3c04548e1f358e7b3ef2d0e802b 
40e30b2125a2b8d524c297c1200163be.vir.exe 89392Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 040e30b2125a2b8d524c297c1200163be 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware