Home / Spyware Encyclopedia / Rootkit.Agent.cvxa << Back

Recommendation to Automatically remove Rootkit.Agent.cvxa


Our products can remove Rootkit.Agent.cvxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cvxa Details


  • Category Rootkit
  • Discovered 3/24/2012 5:59:10 PM
  • Modified 9/2/2024 11:34:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c3dfd63cc41ec27a12d4c4d10d60c0d.vxe.sys 29440  5c3dfd63cc41ec27a12d4c4d10d60c0d 
7ba9b10d22097d44f310d5b3fe597be0.sys 29440  7ba9b10d22097d44f310d5b3fe597be0 
8dc2462074ef14283bdbd20f140aebdb.sys 29440  8dc2462074ef14283bdbd20f140aebdb 
112a731b7babeadbeabb5147c0df2893.sys 29440  112a731b7babeadbeabb5147c0df2893 
c80334171e163034f4d198087516d391.sy.sys 29440  c80334171e163034f4d198087516d391 
88e525cf860f8d137752227deb329256.sys 29440  88e525cf860f8d137752227deb329256 
c78ca0acea076f474e3f5758ce911f57.jpg.sys 29440  c78ca0acea076f474e3f5758ce911f57 
e4832b6f06395b27849e94cae49ac45c.sys 29440  e4832b6f06395b27849e94cae49ac45c 
77e580c462fe82ac976d8f52fce7fc65.tx.sys 29440  77e580c462fe82ac976d8f52fce7fc65 
93e31175f5680d20d360ea287fd6c536.dl.sys 29440  93e31175f5680d20d360ea287fd6c536 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware