Home / Spyware Encyclopedia / Rootkit.Agent.cvax << Back

Recommendation to Automatically remove Rootkit.Agent.cvax


Our products can remove Rootkit.Agent.cvax and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cvax Details


  • Category Rootkit
  • Discovered 7/14/2017 12:47:05 AM
  • Modified 10/27/2023 10:29:40 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c42dd87bdb28f5e41c9036c289086d4e.vir.exe 344064Ladislav Zezula1, 0, 0, 88c42dd87bdb28f5e41c9036c289086d4e 
3d15c2f8a8278a7f0b0e7bee964e59a2.vir.exe 344064Ladislav Zezula1, 0, 0, 88f8862b57555666bba4b61e23e6a55f97 
4b4ee1b685ee24e24805eed70fdb25a6.vir.exe 344064Ladislav Zezula1, 0, 0, 88a01bc71c35f1a117682cca1d3be8d896 
1ec51c2dc1dd5e3b7164f46014479c8a.vir.exe 344064Ladislav Zezula1, 0, 0, 88c66b20bec1e9ce36358db7f6d84f3102 
16b77e37a80a074c8430067ef6583b92.vir.exe 344188Wuhan YaoChuang Software Technology CO.,LTD1, 0, 0, 8816b77e37a80a074c8430067ef6583b92 
2cfd8e9d5188fee40e329d3bd80109e0.vir.exe 348160Wuhan YaoChuang Software Technology CO.,LTD1, 0, 0, 882cfd8e9d5188fee40e329d3bd80109e0 
25f44b6528722b47b459f736e8aea399.vir.exe 344064Ladislav Zezula1, 0, 0, 88b0c23ebbecf6817884e7384d9b353a56 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware