Home / Spyware Encyclopedia / Rootkit.Agent.acfv << Back

Recommendation to Automatically remove Rootkit.Agent.acfv


Our products can remove Rootkit.Agent.acfv and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.acfv Details


  • Category Rootkit
  • Discovered 11/26/2012 2:01:02 PM
  • Modified 8/9/2023 3:12:32 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
431ae8d0c3213c665e128e4459b88b2a5ceef67ece0ecfde3fb987b1a2fee42a.sys 16384  91d7df70056ab332544e7612ec43acaf 
f56ca7049b7922ce8145009f473cd1c7.sys 16384  f56ca7049b7922ce8145009f473cd1c7 
e36d9746d7372aa13cc60025c398416d.sys 16384  e36d9746d7372aa13cc60025c398416d 
01db34abf22aaf9e4f2e8996f9eacfab.sys 32768  01db34abf22aaf9e4f2e8996f9eacfab 
9e6f486c48be5627b1c2b2241270e5ee.sys 16384  9e6f486c48be5627b1c2b2241270e5ee 
851825133ab830d86355c80cca9358ea.sys 32768  851825133ab830d86355c80cca9358ea 
44a3c13b817bf1ecd70712235d1aad5d61823593c87271329f867eac362dee71.sys 16384  9f34f53eabb313efcd744a508a725501 
173526096822d77dae10222d059406e35533682cd1eab01f8833ab972559643728ec2bfe15a5871eb8547c6f08e39.sys 16384  1dfc675bd62648267c8cfcde984dc284 
57e0167a2427cbb5cb292c7ef89886e1.sys 32768  57e0167a2427cbb5cb292c7ef89886e1 
11457cd66a1de40180b32b0e51b2d891.sys 32768  11457cd66a1de40180b32b0e51b2d891 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware