Home / Spyware Encyclopedia / Rootkit.Agent.bipr << Back

Recommendation to Automatically remove Rootkit.Agent.bipr


Our products can remove Rootkit.Agent.bipr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bipr Details


  • Category Rootkit
  • Discovered 2/6/2024 11:20:54 PM
  • Modified 2/12/2024 1:08:18 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan.win32.hooker.am 18656  a2a4cd732675caadca3a6295f79606d3 
8be27aaf34f8858a9043775c4d9dd8b0.dll 41984  8be27aaf34f8858a9043775c4d9dd8b0 
abd769bf22542ea63ae275d8223d176a.dll 41984  abd769bf22542ea63ae275d8223d176a 
35f070c9eefbfde036076c5398a39f221e869a0f1b1dc2145e0ef9adfec7e12f727809b4f8e12e5efa06c3700925b0939b1.dll 41984  b327eda5379c92da93a457812d60d3a3 
58e538be9ce7860afe4f5feea725c86d606e08c5a25f634d5aac744ae4375f4d.dll 41984  786630a1d6360c9e75b514f9a239d2c2 
7b65627689903165142edc902222a8e94eba30c4c850877726c27b05f25f3ce2.dll 41984  42048523dbd3f39898680405f0d30210 
1896c351d2a426dd73d8209b3387662f.dll 41984  1896c351d2a426dd73d8209b3387662f 
4219ad6e6557f2420acfbc508b33009e.dll 41984  4219ad6e6557f2420acfbc508b33009e 
6bb02069abceee317ca9c7bdc06707a08c29c98c587b8dec5aba65e868d7d72a.dll 170411  2f6546a10e8dc2067ccd5e5e7dbf9af2 
0ac95fa502184cafc3c23d6c8df951fc.vir.sys 6832  0ac95fa502184cafc3c23d6c8df951fc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware