Home / Spyware Encyclopedia / Rootkit.Agent.hvf << Back

Recommendation to Automatically remove Rootkit.Agent.hvf


Our products can remove Rootkit.Agent.hvf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.hvf Details


  • Category Rootkit
  • Discovered 5/21/2011 11:28:31 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6447be9a2c7928351b1f50e759a3302d.vir.sys 12288 0, 0, 0, 06447be9a2c7928351b1f50e759a3302d 
cdaa018dc716e86d55c25e0e4af999d7.vir.sys 12288 0, 0, 0, 0cdaa018dc716e86d55c25e0e4af999d7 
rootkit.win32.agent.hvf-224b991149729424bd29dc46e56a99585d6fd712.exe 16384  cc7a644d6893fcf2f4b551fe112d484909/08/2023
067e791581a32772da25bab3af45a85a.sys 12288 0, 0, 0, 0067e791581a32772da25bab3af45a85a09/08/2023
0590b0f3b73e403a9bdc4cb5f4c4673f.sys 12288 0, 0, 0, 00590b0f3b73e403a9bdc4cb5f4c4673f05/09/2020
584454ba1b32e594e2d0461c83bd283f.vir.sys 12288 0, 0, 0, 0584454ba1b32e594e2d0461c83bd283f 
0b3e4dacd776811f09edcf8e2367875a.vir.sys 12288 0, 0, 0, 00b3e4dacd776811f09edcf8e2367875a 
b910930c3707b2468452dfee40f770c2.vir.sys 12288 0, 0, 0, 0b910930c3707b2468452dfee40f770c2 
81fee8f112815f96fa23bf954fb77c8e.sys 12288 0, 0, 0, 081fee8f112815f96fa23bf954fb77c8e 
60706caaf56a0db6431839d4c8de0734.vir.sys 12288 0, 0, 0, 060706caaf56a0db6431839d4c8de0734 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware