Home / Spyware Encyclopedia / Rootkit.Agent.bisf << Back

Recommendation to Automatically remove Rootkit.Agent.bisf


Our products can remove Rootkit.Agent.bisf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bisf Details


  • Category Rootkit
  • Discovered 10/6/2024 12:02:42 AM
  • Modified 10/7/2024 10:19:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9c9e36bd5afa02a9b2d385f1c278ceda.exe 2653966  9c9e36bd5afa02a9b2d385f1c278ceda 
e90942671be20bcd7a167bacb89439906c49dc7ed279080e83ceac62bcd7a9b5fd30e743c20ec5b277412b32ca0d1590add.exe 3640320 1, 0, 0, 1c2efec6f5660c3129be0f6a74421a5d8 
ee309910163b0da0215907cf91fce0f9edafc0bd.exe 3390464 1, 0, 0, 1a2ab229727b4b24d2549e3e0d8f7758d 
4.exe 3022848 1, 0, 0, 11e230f6af559306076ff540bb5ef9900 
5.exe 3411456 1, 0, 0, 1f3c3a90a8916a6c6bd7d510d6f3d55a3 
ed1e4b1a6ae942530e84d3c44b95e2aa57a4dec75e8e733372106c26065fc44f7f1ecf8664a2576681ab2dad434a543d7e7.exe 2200064 1, 0, 0, 1ea7924a7593a7adb45bc3d8d899d62e9 
5.exe 2230272 1, 0, 0, 118493a79a19a8f0de7e1b5c4cf067c36 
f3f54765e1013613133251491d2e9b90dc3f2377.bin.exe 3451904 1, 0, 0, 1b363064c1fef78e38961fba760d6e413 
1.exe 3013120 1, 0, 0, 159a9509eeeea6567dcd1703aae344a16 
a090c6b74eb55e780901725afc42e94bdf043706a63612c533d972dca14481ab43c37ca5555f8c7b2ad1daf2fa639e8cb18.exe 3995648 1, 0, 0, 1006da3d7b11907f4a341f5236b0da30d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware