Home / Spyware Encyclopedia / Rootkit.Agent.hvf << Back

Recommendation to Automatically remove Rootkit.Agent.hvf


Our products can remove Rootkit.Agent.hvf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.hvf Details


  • Category Rootkit
  • Discovered 5/21/2011 11:28:31 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
27d65ab8843e1da9a8b8dbbdd9776f86.vxe.sys 12288 0, 0, 0, 027d65ab8843e1da9a8b8dbbdd9776f86 
e23d2d288344aa7b7e81c21cc5fbfc4f.vxe.sys 12288 0, 0, 0, 0e23d2d288344aa7b7e81c21cc5fbfc4f 
ab94a0786e7184a70053ef9f89936d58e5ebc7b65135769507b205d1967ffc59.sys 23328 0, 0, 0, 04a4a55dcf1fc85e04b64d28605a87b27 
6447be9a2c7928351b1f50e759a3302d.vir.sys 12288 0, 0, 0, 06447be9a2c7928351b1f50e759a3302d 
84952664ebddb4747f96751e3db93f7a.vir.sys 12288 0, 0, 0, 084952664ebddb4747f96751e3db93f7a 
b910930c3707b2468452dfee40f770c2.vir.sys 12288 0, 0, 0, 0b910930c3707b2468452dfee40f770c2 
0b3e4dacd776811f09edcf8e2367875a.vir.sys 12288 0, 0, 0, 00b3e4dacd776811f09edcf8e2367875a 
584454ba1b32e594e2d0461c83bd283f.vir.sys 12288 0, 0, 0, 0584454ba1b32e594e2d0461c83bd283f 
rootkit.win32.agent.hvf-224b991149729424bd29dc46e56a99585d6fd712.exe 16384  cc7a644d6893fcf2f4b551fe112d484909/08/2023
067e791581a32772da25bab3af45a85a.sys 12288 0, 0, 0, 0067e791581a32772da25bab3af45a85a09/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware