Home / Spyware Encyclopedia / Rootkit.Agent.bisf << Back

Recommendation to Automatically remove Rootkit.Agent.bisf


Our products can remove Rootkit.Agent.bisf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bisf Details


  • Category Rootkit
  • Discovered 10/6/2024 12:02:42 AM
  • Modified 10/7/2024 10:19:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ef2b5311.exe 12544  5ecdf34f0f020f34ddc6b07efb2527b4 
1d7e4a5be4f0c7da9a0c1ab23b37b8e4.exe 3421696 1.0.0.11d7e4a5be4f0c7da9a0c1ab23b37b8e4 
9c9e36bd5afa02a9b2d385f1c278ceda.exe 2653966  9c9e36bd5afa02a9b2d385f1c278ceda 
46a6c8379df44f2227ad3d8c6f0a4cb2f65e1da6.exe 3482624 1, 0, 0, 1358666b6e78bfbfb2f89c5db1e1f4e41 
67d74e0aebdb68194697d36f237fd1501d3d530b.exe 3421696 1, 0, 0, 1b84b9919325487605c6a39a9751e9dac 
e90942671be20bcd7a167bacb89439906c49dc7ed279080e83ceac62bcd7a9b5fd30e743c20ec5b277412b32ca0d1590add.exe 3640320 1, 0, 0, 1c2efec6f5660c3129be0f6a74421a5d8 
ee309910163b0da0215907cf91fce0f9edafc0bd.exe 3390464 1, 0, 0, 1a2ab229727b4b24d2549e3e0d8f7758d 
2.exe 1612288 1, 0, 0, 1e02767c97152a92bc24ebd643823f3cd 
2.exe 3485184 1, 0, 0, 12537f3c3ef2fc0f2c644f52f6e4aeb9f 
1926fff0b0d1e5b8a65512217fce311e8c4b76d8a81c3ae4497b33efaa8816acb90d0adbbf7deeb6dc23489bb16bf51c886.exe 1975296 1, 0, 0, 1800ba9058050f3111baa2fbef2d81557 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware