Home / Spyware Encyclopedia / Rootkit.Agent.hvf << Back

Recommendation to Automatically remove Rootkit.Agent.hvf


Our products can remove Rootkit.Agent.hvf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.hvf Details


  • Category Rootkit
  • Discovered 5/21/2011 11:28:31 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
58c12129c739edf80a8fe704802a9b4e7294eaf58a81ed3488849c878b17f1fc.sys 12288 0, 0, 0, 0db8193e0593b5fbf16c7b0ee7070b22a 
bdeed90fafe2e14e9bf889d5366ad20e.vxe.sys 12288 0, 0, 0, 0bdeed90fafe2e14e9bf889d5366ad20e 
b24ed38310a522e35f5cee6d0b7cb288.vxe.sys 12288 0, 0, 0, 0b24ed38310a522e35f5cee6d0b7cb288 
ab94a0786e7184a70053ef9f89936d58e5ebc7b65135769507b205d1967ffc59.sys 23328 0, 0, 0, 04a4a55dcf1fc85e04b64d28605a87b27 
8755010adb285e93ddd4dc62f74750c5.vir.sys 12288 0, 0, 0, 08755010adb285e93ddd4dc62f74750c5 
6447be9a2c7928351b1f50e759a3302d.vir.sys 12288 0, 0, 0, 06447be9a2c7928351b1f50e759a3302d 
60706caaf56a0db6431839d4c8de0734.vir.sys 12288 0, 0, 0, 060706caaf56a0db6431839d4c8de0734 
84952664ebddb4747f96751e3db93f7a.vir.sys 12288 0, 0, 0, 084952664ebddb4747f96751e3db93f7a 
b910930c3707b2468452dfee40f770c2.vir.sys 12288 0, 0, 0, 0b910930c3707b2468452dfee40f770c2 
cdaa018dc716e86d55c25e0e4af999d7.vir.sys 12288 0, 0, 0, 0cdaa018dc716e86d55c25e0e4af999d7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware