Home / Spyware Encyclopedia / Rootkit.Agent.dhhx << Back

Recommendation to Automatically remove Rootkit.Agent.dhhx


Our products can remove Rootkit.Agent.dhhx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dhhx Details


  • Category Rootkit
  • Discovered 7/7/2013 9:16:20 AM
  • Modified 3/25/2015 3:25:42 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
29d482ae9908ad985dee6cb5beb3dc00.vir.sys 32768  29d482ae9908ad985dee6cb5beb3dc00 
c3212bcfe21936aea4db550ee6172365.vir.sys 32768  c3212bcfe21936aea4db550ee6172365 
e9102e1b505bc4040a9b8ab992553b5f.vir.sys 54740  e9102e1b505bc4040a9b8ab992553b5f 
173231001541fd3ecae59b75c8da8fe2cebda70fbbba0d4a53a89b293b63f116d2eb51386a79df983079cc4fb29e9.sys 32768  0cd298fb73cd375b4863d9e8ecc008a6 
101e9f483421e50682ea3d12b06fdda8.vir.exe 93516Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0101e9f483421e50682ea3d12b06fdda8 
994b885b46ee22c824adddb169758fe4.vir.sys 8480  994b885b46ee22c824adddb169758fe4 
344242b63dcc2b8d741960bf6de79079.vir.sys 32768  344242b63dcc2b8d741960bf6de79079 
fc80dc538b5e6b820becf519d6406cd8.vir.sys 8480  fc80dc538b5e6b820becf519d6406cd8 
95917fd27062780707db3a2113478b13.vir.sys 8480  95917fd27062780707db3a2113478b13 
cc701716943bd8390519fadde8d461b5.vir.sys 8480  cc701716943bd8390519fadde8d461b5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware