Home / Spyware Encyclopedia / Rootkit.Agent.ivh << Back

Recommendation to Automatically remove Rootkit.Agent.ivh


Our products can remove Rootkit.Agent.ivh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.ivh Details


  • Category Rootkit
  • Discovered 3/12/2013 9:51:48 PM
  • Modified 7/27/2023 4:45:19 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
007a79367e0740934958efc18301f633.vir.sys 59392  007a79367e0740934958efc18301f633 
117996de7149ce7967cd01a32a950677.vir.sys 59392  117996de7149ce7967cd01a32a950677 
c1a044e40d0a0de174ff64d8615f7848.vir.sys 59392  c1a044e40d0a0de174ff64d8615f7848 
1a3861fd632e4cdf9c92a70a3a6000c9.sys 59392  1a3861fd632e4cdf9c92a70a3a6000c927/07/2023
c1a044e40d0a0de174ff64d8615f7848.vir.sys 59392  c1a044e40d0a0de174ff64d8615f784829/12/2022
5009bd0dcd30df21d5d457692ce8eecb36716a5d6ab3f7bd3e8a3c5e6c3f9163.sys 59392  89c44b3218517aeaf908d69b01b0c40217/06/2020
ddeb893b0a5e87874463a8c0d6ef410a.vir.sys 59392  ddeb893b0a5e87874463a8c0d6ef410a 
de5b7d7c1198cac1aa718af9bcd75d9e.vir.sys 59392  de5b7d7c1198cac1aa718af9bcd75d9e 
17113903753cb8184206ab559d9fb1e36043c78bd3189aba7ee5027ee114c8f3617f4388cffe47f2e5665e581b6ca.sys 59392  3a30e52c5d01e036c85ead7049174a09 
1a3861fd632e4cdf9c92a70a3a6000c9.sys 59392  1a3861fd632e4cdf9c92a70a3a6000c9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware