Home / Spyware Encyclopedia / Rootkit.Agent.bfko << Back

Recommendation to Automatically remove Rootkit.Agent.bfko


Our products can remove Rootkit.Agent.bfko and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfko Details


  • Category Rootkit
  • Discovered 6/6/2013 6:49:51 PM
  • Modified 3/11/2024 7:26:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
207db8ac80604cc0791c5c696013d0a7.exe 978432  207db8ac80604cc0791c5c696013d0a7 
a27f8d4df998bed9ccce5790aabd9c99e80060a40435d5c8d3dc1d6af0838f2d.exe 39083  1d95f7440ef7d899d8fe137015fe0ebd 
ef9ac0970ab2f177c62b46809b97fad4fb7660a1.bin.exe 39064  e03461de7843d3e5f33d87f20a6ef854 
60cb2983d3e8983445783b3d9601b24a.vir.exe 978432  60cb2983d3e8983445783b3d9601b24a 
f505cfcd68d5c37c92903b3765d88514.exe 1606144  f505cfcd68d5c37c92903b3765d88514 
one.sys 7552Lenovo (Beijing) Limited1.0.0.070ce600a13fd315684d6736626ca18a917/12/2019
170702043757db108255514f26ff79869647726d073b4a9ecf06c5474b490ffc44741b33b1d1e18430c1a0dc89b6b.exe 39048  fdc5bb8099fe5d73387236e391dbfc6911/03/2024
3f1035e216b9a3d58d9a1d7a0873744c1ef08111eb7793c99147bdd9a033c543.exe 39120  741a8fe549d692f72695b99bde4480ea26/02/2020
aa86599b722b773938810005b6669083.vir.exe 188416  aa86599b722b773938810005b6669083 
b1c4cddb799839fcab78cd42f91fd4a6.vir.exe 188416  b1c4cddb799839fcab78cd42f91fd4a6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware