Home / Spyware Encyclopedia / Rootkit.Agent.aih << Back

Recommendation to Automatically remove Rootkit.Agent.aih


Our products can remove Rootkit.Agent.aih and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.aih Details


  • Category Rootkit
  • Discovered 9/24/2024 6:15:01 AM
  • Modified 9/24/2024 10:06:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
38e66f2b.exe 167936  51ad584f6fc01068d98cfb7e4e985617 
03fb7431.exe 167936  f8f7883d80ea20f1a7926c60ee2f135e 
a74226a8c9f41eafd5643ca8358bb6ab.exe 167936  a74226a8c9f41eafd5643ca8358bb6ab 
eb5272fb089ee5410b756f2420a2bf01.sys 167936  eb5272fb089ee5410b756f2420a2bf01 
37b9f5d3347563bc7147b1d31495d9c8.sys 167936  37b9f5d3347563bc7147b1d31495d9c8 
80432e35c94ec88edaff6f7f6ea4085fc305aeaea433cbd1286bba462b215889.sys 167936  36e739c0184726821db86b77ddbc12f9 
9647a13a3b970d2b29148cffaff6ff05.sys 167936  9647a13a3b970d2b29148cffaff6ff05 
9ac8af6de327f106a2da770826fea0399c78b12957936dd69e17cafd45a5a671.sys 167936  086536dafc16980baa707873cfec2741 
8b8fd5d9f7a9e2c90fda2da75244bbdf.vir.sys 167936  8b8fd5d9f7a9e2c90fda2da75244bbdf 
4af5c1659669bcdd0f8fae1ad57ea78c.sys 167936  4af5c1659669bcdd0f8fae1ad57ea78c25/05/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware