Home / Spyware Encyclopedia / Rootkit.Agent.bfko << Back

Recommendation to Automatically remove Rootkit.Agent.bfko


Our products can remove Rootkit.Agent.bfko and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfko Details


  • Category Rootkit
  • Discovered 6/6/2013 6:49:51 PM
  • Modified 3/11/2024 7:26:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
one.sys 7552Lenovo (Beijing) Limited1.0.0.070ce600a13fd315684d6736626ca18a9 
9d46d4d7b800418e4c6962044401a3cc.exe 1032192  9d46d4d7b800418e4c6962044401a3cc 
0af42aff3f99d994d676fea3ad528082.exe 39064  0af42aff3f99d994d676fea3ad528082 
207db8ac80604cc0791c5c696013d0a7.exe 978432  207db8ac80604cc0791c5c696013d0a7 
e1a3c0b3b90ee4bd65600ff324a4a0fe2e57e64d.bin.exe 977920  0d80f864fc31104ba9d2ae775bd7d320 
b4fe60adcb95e12c51eb38b9acfc466f.exe 39038  b4fe60adcb95e12c51eb38b9acfc466f 
a27f8d4df998bed9ccce5790aabd9c99e80060a40435d5c8d3dc1d6af0838f2d.exe 39083  1d95f7440ef7d899d8fe137015fe0ebd 
565b7ea60d8dbafde0acf473704ab7ed79879b5d82d3e710ca9c4acbca1b2db9.exe 39039  45be3085dac266d9012b75e84e501b8f 
48d7acf6cf6152a78aa88d9e3e9fa1e4.exe 1032192  48d7acf6cf6152a78aa88d9e3e9fa1e4 
203750054922c23eb991234a72f9ed4209bbe7c6d5b366d7b145017397256b898830cfa117270f543793963736be9.exe 978432  e97ed35d3f9f259b7efdad6a34debcdb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware