Home / Spyware Encyclopedia / Rootkit.Agent.acfv << Back

Recommendation to Automatically remove Rootkit.Agent.acfv


Our products can remove Rootkit.Agent.acfv and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.acfv Details


  • Category Rootkit
  • Discovered 11/26/2012 2:01:02 PM
  • Modified 8/9/2023 3:12:32 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9e6f486c48be5627b1c2b2241270e5ee.sys 16384  9e6f486c48be5627b1c2b2241270e5ee 
57e0167a2427cbb5cb292c7ef89886e1.sys 32768  57e0167a2427cbb5cb292c7ef89886e1 
11457cd66a1de40180b32b0e51b2d891.sys 32768  11457cd66a1de40180b32b0e51b2d891 
38618519fcab1485f4d7054a3643f15d.vir.sys 32768  38618519fcab1485f4d7054a3643f15d 
1828190593692c43fd321f26e6868f584873fb1983c643909af4b542e8ba76f5f0486b8f8e5233591e90c3588bf41.sys 8192  9890182db71b13862f5593c92751fd5a 
18264903756a2a7ab95801d34f5295d83a61e5dd4f2161a577e2fc3edde18cf9809e164f9024e83098817d6fdcee2.sys 32768  b25013fe89ea1e39ebad10bbc25cd73b 
c93445f2900f7eb8a92370ff726b804e.vir.sys 32768  c93445f2900f7eb8a92370ff726b804e 
174241004659721da5aeae0e177dabe489d5f3412ee3496954f8dbb26ea4b83c1d37abb4b10501bf6b3a561fa5297.sys 16384  24197355c5ff1998d5532111246bca0c 
e6d1af3eabedf8ec720d5874392a5a54.vir.sys 16384  e6d1af3eabedf8ec720d5874392a5a54 
d3613a78f0bff7dcd2194b9b68b49ec4.vir.sys 16384  d3613a78f0bff7dcd2194b9b68b49ec4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware