Home / Spyware Encyclopedia / Rootkit.Agent.fh << Back

Recommendation to Automatically remove Rootkit.Agent.fh


Our products can remove Rootkit.Agent.fh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.fh Details


  • Category Rootkit
  • Discovered 1/24/2024 4:52:57 AM
  • Modified 1/29/2024 11:04:58 AM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ACD3062A.DLL 30756  9977ee5a1ed00710489736e733634c1f 
3309cfb7e109904f38953178a42fef7716151e43a1008d5274f17397b7a0a5e4.sys 21686  00e28523456a4f570956079674a7e44512/07/2020
ea804c18667e79073e22c88813655b7e.vir.sys 20992  ea804c18667e79073e22c88813655b7e 
a3491505f5fd66635e615df45da6b5e091bec25d2112000353140cd422ac87f1.sys 22219  d2214365472d0fa53e75c9ea0b506ca5 
3309cfb7e109904f38953178a42fef7716151e43a1008d5274f17397b7a0a5e4.sys 21686  00e28523456a4f570956079674a7e445 
3c9f979666d31ab78a9e98974517fbf2.sys 24576  3c9f979666d31ab78a9e98974517fbf2 
dee328d2c503cd3975c05ea69108c2b3.sys 22059  dee328d2c503cd3975c05ea69108c2b3 
8AE25E92.EXE 21875  865cebb24ed41fd6fe597210e471b1e6 
CA3205F2.DLL 32015  d11dd982c12f018628d8736f776e0506 
3c126e82e3f672d78fa780b74bd2c2e62ef054bc0543133291a3233dce8625d9.sys 22030  026e808d1b93c4af51e0c17c6da7e046 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware