Home / Spyware Encyclopedia / Rootkit.Agent.blvf << Back

Recommendation to Automatically remove Rootkit.Agent.blvf


Our products can remove Rootkit.Agent.blvf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blvf Details


  • Category Rootkit
  • Discovered 12/19/2012 8:06:18 PM
  • Modified 8/8/2024 11:41:40 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
19313003056f076b8bc6cf54d11b60215c72cad6a449313270b6190e68107e0ff03d2d423421cd85fa724e7bb7560.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built by003d0ad1edba25a420eb014d3eda2b5708/08/2024
73b39df2ba4bb5e728f2dd964ad547d3.vir.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built by73b39df2ba4bb5e728f2dd964ad547d3 
30ba3b646ed03aac6c421d3e44ea3f8d.vir.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built by30ba3b646ed03aac6c421d3e44ea3f8d 
19313003056f076b8bc6cf54d11b60215c72cad6a449313270b6190e68107e0ff03d2d423421cd85fa724e7bb7560.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built by003d0ad1edba25a420eb014d3eda2b57 
c421f54ce580edeb1257b4762293d622.vir.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built byc421f54ce580edeb1257b4762293d622 
712c23099e81474b593e1a30850fced19022e50d7a163e6368640824c05fdd46.sys 21120Windows (R) 2000 DDK provider5.1.2600.0 built byb61cf026e8b660eeda184f4fc37ecedc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware