Home / Spyware Encyclopedia / Rootkit.Agent.hvf << Back

Recommendation to Automatically remove Rootkit.Agent.hvf


Our products can remove Rootkit.Agent.hvf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.hvf Details


  • Category Rootkit
  • Discovered 5/21/2011 11:28:31 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
58c12129c739edf80a8fe704802a9b4e7294eaf58a81ed3488849c878b17f1fc.sys 12288 0, 0, 0, 0db8193e0593b5fbf16c7b0ee7070b22a 
e23d2d288344aa7b7e81c21cc5fbfc4f.vxe.sys 12288 0, 0, 0, 0e23d2d288344aa7b7e81c21cc5fbfc4f 
6b49a4656dc95989f1a987292e4ee3dc.vxe.sys 16384 0, 0, 0, 06b49a4656dc95989f1a987292e4ee3dc 
bdeed90fafe2e14e9bf889d5366ad20e.vxe.sys 12288 0, 0, 0, 0bdeed90fafe2e14e9bf889d5366ad20e 
41465b20dbaf9e7ed76fc4b43aa4757ab9e559ca21cf96b70553353cb8774469.sys 21280 0, 0, 0, 088e56bef977f555be52a64376e860cd3 
ab94a0786e7184a70053ef9f89936d58e5ebc7b65135769507b205d1967ffc59.sys 23328 0, 0, 0, 04a4a55dcf1fc85e04b64d28605a87b27 
8755010adb285e93ddd4dc62f74750c5.vir.sys 12288 0, 0, 0, 08755010adb285e93ddd4dc62f74750c5 
60706caaf56a0db6431839d4c8de0734.vir.sys 12288 0, 0, 0, 060706caaf56a0db6431839d4c8de0734 
84952664ebddb4747f96751e3db93f7a.vir.sys 12288 0, 0, 0, 084952664ebddb4747f96751e3db93f7a 
0b3e4dacd776811f09edcf8e2367875a.vir.sys 12288 0, 0, 0, 00b3e4dacd776811f09edcf8e2367875a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware