Home / Spyware Encyclopedia / Rootkit.Agent.bisf << Back

Recommendation to Automatically remove Rootkit.Agent.bisf


Our products can remove Rootkit.Agent.bisf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bisf Details


  • Category Rootkit
  • Discovered 10/6/2024 12:02:42 AM
  • Modified 10/7/2024 10:19:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1d7e4a5be4f0c7da9a0c1ab23b37b8e4.exe 3421696 1.0.0.11d7e4a5be4f0c7da9a0c1ab23b37b8e4 
e90942671be20bcd7a167bacb89439906c49dc7ed279080e83ceac62bcd7a9b5fd30e743c20ec5b277412b32ca0d1590add.exe 3640320 1, 0, 0, 1c2efec6f5660c3129be0f6a74421a5d8 
ee309910163b0da0215907cf91fce0f9edafc0bd.exe 3390464 1, 0, 0, 1a2ab229727b4b24d2549e3e0d8f7758d 
2.exe 1918976 1, 0, 0, 1a3a69a8a265ab8ecdbb73f4f7ca9d005 
5ba9dde253403d5dbd7335eef8618a85d4da73cdaf8505d25aeb814dfe54b11da45e1de53f46a347ae7c56de1aaa880031f.exe 2864128 1, 0, 0, 146f441d8fec6844172d86ecbf97c3502 
1.exe 1976320 1, 0, 0, 1b0937773ed321ccaad9dabdcaa6573a1 
5.exe 2230272 1, 0, 0, 118493a79a19a8f0de7e1b5c4cf067c36 
3.exe 3471872 1, 0, 0, 13b610f377d06560adeb9940ad1e6df10 
1.exe 3013120 1, 0, 0, 159a9509eeeea6567dcd1703aae344a16 
a090c6b74eb55e780901725afc42e94bdf043706a63612c533d972dca14481ab43c37ca5555f8c7b2ad1daf2fa639e8cb18.exe 3995648 1, 0, 0, 1006da3d7b11907f4a341f5236b0da30d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware