Home / Spyware Encyclopedia / Rootkit.Agent.cvxa << Back

Recommendation to Automatically remove Rootkit.Agent.cvxa


Our products can remove Rootkit.Agent.cvxa and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cvxa Details


  • Category Rootkit
  • Discovered 3/24/2012 5:59:10 PM
  • Modified 9/2/2024 11:34:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c3dfd63cc41ec27a12d4c4d10d60c0d.vxe.sys 29440  5c3dfd63cc41ec27a12d4c4d10d60c0d 
d052813d8847b2d85a322bcc725f8637.sys 29440  d052813d8847b2d85a322bcc725f8637 
7ba9b10d22097d44f310d5b3fe597be0.sys 29440  7ba9b10d22097d44f310d5b3fe597be0 
1d96f6790d9c959c8931c4db770a1e64.ht.sys 29440  1d96f6790d9c959c8931c4db770a1e64 
8dc2462074ef14283bdbd20f140aebdb.sys 29440  8dc2462074ef14283bdbd20f140aebdb 
7577a3da9548bc7053fb74e6c0a5bc64.dl.sys 29440  7577a3da9548bc7053fb74e6c0a5bc64 
112a731b7babeadbeabb5147c0df2893.sys 29440  112a731b7babeadbeabb5147c0df2893 
0e88e2f259298624d76e087d82968f83.co.sys 29440  0e88e2f259298624d76e087d82968f83 
8d200a6b4a54aa76a106d319a03bcf89.bm.sys 29440  8d200a6b4a54aa76a106d319a03bcf89 
a511e878b789ac77764d8114da52463b.sy.sys 29440  a511e878b789ac77764d8114da52463b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware