Home / Spyware Encyclopedia / Rootkit.Agent.bipr << Back

Recommendation to Automatically remove Rootkit.Agent.bipr


Our products can remove Rootkit.Agent.bipr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bipr Details


  • Category Rootkit
  • Discovered 2/6/2024 11:20:54 PM
  • Modified 2/12/2024 1:08:18 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.agent.bipr-7397cd187edf591fbcf50aedc2dde1b110855c1732a22b30a72a3d50aaa6956b.exe 41984  f52ed607a3cce984a3606f44bb58a39005/08/2023
rootkit.win32.agent.bipr-2f3ba2759b7d137252b33ea7813293923fe33bac.exe 32672  d9ab6b124d89a6c3c93307380f125ed009/08/2023
0eae06f783b371b0995ea57bfb4abc32.vir.dll 159086  0eae06f783b371b0995ea57bfb4abc32 
951067df8eeeeaf279cc744d00d11f06.vir.sys 4816  951067df8eeeeaf279cc744d00d11f06 
56d3bd22a68faf78880c657db9f9e598.vir.sys 305424  56d3bd22a68faf78880c657db9f9e598 
34e5efbd377d0bb2c9ba91e5479e9f6b.vir.sys 6160  34e5efbd377d0bb2c9ba91e5479e9f6b 
66a9c1b2fa547d618f82e220b1d68ea3.vir.sys 6160  66a9c1b2fa547d618f82e220b1d68ea3 
2b0eed8e3e5c24c335bb41f1e6ffb719.vir.sys 18240  2b0eed8e3e5c24c335bb41f1e6ffb719 
0ac95fa502184cafc3c23d6c8df951fc.vir.sys 6832  0ac95fa502184cafc3c23d6c8df951fc 
6bb02069abceee317ca9c7bdc06707a08c29c98c587b8dec5aba65e868d7d72a.dll 170411  2f6546a10e8dc2067ccd5e5e7dbf9af2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware