Home / Spyware Encyclopedia / Rootkit.Agent.cvxa << Back

Recommendation to Automatically remove Rootkit.Agent.cvxa


Our products can remove Rootkit.Agent.cvxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cvxa Details


  • Category Rootkit
  • Discovered 3/24/2012 5:59:10 PM
  • Modified 9/2/2024 11:34:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7ba9b10d22097d44f310d5b3fe597be0.sys 29440  7ba9b10d22097d44f310d5b3fe597be0 
d052813d8847b2d85a322bcc725f8637.sys 29440  d052813d8847b2d85a322bcc725f8637 
1d96f6790d9c959c8931c4db770a1e64.ht.sys 29440  1d96f6790d9c959c8931c4db770a1e64 
7577a3da9548bc7053fb74e6c0a5bc64.dl.sys 29440  7577a3da9548bc7053fb74e6c0a5bc64 
d55689540013fe390fb003734425c88c.sys 29440  d55689540013fe390fb003734425c88c 
cab90a14eba334d297db8924f4d7434b.co_.sys 29440  cab90a14eba334d297db8924f4d7434b 
e185fbaf117b351f127e45fc7d74b60e.jpg.sys 29440  e185fbaf117b351f127e45fc7d74b60e 
cc3c0bb07b9d03cb43e0b3495e2a8bbe.sy.sys 29440  cc3c0bb07b9d03cb43e0b3495e2a8bbe 
9f5b55c86155844ef28eb8edd19bb8af.sys 29440  9f5b55c86155844ef28eb8edd19bb8af 
112a731b7babeadbeabb5147c0df2893.sys 29440  112a731b7babeadbeabb5147c0df2893 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware