What is dh.exe?
dh.exe is a legitimate process file popularly known as Install Helper. It belongs to Install Helper, developed by OpenCandy, Inc. It is located in C:\Program Files by default.
Malware programmers write virus files with malicious scripts and save them as dh.exe with an intention to spread virus on the internet.
Affected Platforms: Windows OS
How to determine if your computer is infected with dh.exe malware?
Look out for the these symptoms to check if your PC is infected with dh.exe malware:
- Unstable internet connection
- dh.exe occupies extra CPU space
- PC processing speed slows down
- Browser often redirects to irrelevant websites
- Browser is bombarded with hordes of popup ads
- Computer screen freezes repeatedly
Take the following steps to diagnose your PC for possible dh.exe malware attack:
Step 1: Simultaneously press CTRL+ALT+DEL keys to open Task Manager.
Step 2: If you notice the file located outside C:\Program Files, perform an antivirus scan to get rid of the malware.
How to remove dh.exe malware from system using Comodo Antivirus?
Ideally, replacing the existing dh.exe file on your computer with a different version procured from the internet is advisable. To remove the file using Comodo's trusted and effective antivirus software, follow the steps below:
Step 1: Download the award-winning Comodo Free Antivirus.
Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.
Step 3: Select Customize Configuration option and arrange installers, configuration, and file location.
Step 4: Once the Installation is Finished, restart your PC.
Step 5: It will take some time for the Comodo Internet Security to update the antivirus.
Step 6: Proceed with a quick scan that automatically begins after the update.
Step 7: If threats are found during the scanning, you will be prompted with an alert screen.
Step 8: Comodo Antivirus will remove dh.exe malware from your computer including all other malwares!
No. | Company | File Type | SHA1 | MD5 | Malware Name |
Digitally Signed |
File Version |
Product Version |
Submitted From |
Malware Behavior |
---|---|---|---|---|---|---|---|---|---|---|
1 | N/A | Executable | 5edd0abaab0536ff 257374a17933cff5 ab333415 |
eae62e05a6b7b073 1478460f13e4bfb8 |
Backdoor.Win 32.IRCBot.~H YJ |
No | N/A | N/A | ![]() |
N/A |
2 | N/A | Executable | bda136e0291fc1a2 dff9a36cb1b949f7 957299b8 |
196ba0506c161f64 4512f347d9ac2868 |
Packed.Win32 .MUPACK.~KW |
No | N/A | N/A | ![]() |
N/A |
3 | N/A | Executable | b2a85a319fa772b3 150a5001504f86cf 01189406 |
0495e3845051e147 abe80964b14039db |
TrojWare.Win 32.Delf.~BNG |
No | N/A | N/A | ![]() |
N/A |
4 | N/A | Executable | 0ec6ec0fa1baa953 f6caaff9ec4b189f df439b78 |
52942229a172cdbb 21d0388080981660 |
TrojWare.Win 32.Trojan.MP EC.Gen |
No | N/A | N/A | ![]() |
N/A |
No. | Company | File Type | SHA1 | MD5 | Digitally Signed |
File Version |
Product Version |
Submitted From |
---|---|---|---|---|---|---|---|---|
1 | Iosof Technology, Inc. | Executable | f4ede1148424266e 73d50f5adc33ca0b 2c72d671 |
fdad7edfd2909edc 82b987991deee1be |
No | N/A | N/A | ![]() |
2 | N/A | Executable | 0d193defa04f325c 61a0acdf45b2fe02 1f5cdf23 |
a3b39babd6a9102e 40f4bded7909f1cd |
No | N/A | N/A | ![]() |
3 | Edy Vanhoten | Executable | 41834a37f166a290 ed0406331f27de18 1764f640 |
afb0ae6934c29e69 be4837c6f07873ec |
No | 07122017 | 2.10 | ![]() |
4 | Epic Games, Inc. | Executable | ad5fb0ed2dd4eb3c 28356f2b27338dce 63abf65c |
6c821a857e153504 e9123eb672b99a99 |
No | N/A | ++UE4+Rele ase-4.22-C L-0 |
![]() |