Home / Spyware Encyclopedia / Rootkit.Agent.bfko << Back

Recommendation to Automatically remove Rootkit.Agent.bfko


Our products can remove Rootkit.Agent.bfko and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfko Details


  • Category Rootkit
  • Discovered 6/6/2013 6:49:51 PM
  • Modified 3/11/2024 7:26:05 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
207db8ac80604cc0791c5c696013d0a7.exe 978432  207db8ac80604cc0791c5c696013d0a7 
b4fe60adcb95e12c51eb38b9acfc466f.exe 39038  b4fe60adcb95e12c51eb38b9acfc466f 
570ff1f810253a6141cf38aa91a8bd04.exe 1032192  570ff1f810253a6141cf38aa91a8bd04 
60cb2983d3e8983445783b3d9601b24a.vir.exe 978432  60cb2983d3e8983445783b3d9601b24a 
15010309822cd11a8d183c13e87a3dcf6e8b2b32af1ce8acddd8f4d607f82dfccd91725f2a2affd9c3615b82f98dd.exe 976896  7e8d3f4de168d3f55ad0f797164e7db6 
87cd5b47b9877c2846968289a7551181.vir.exe 1032192  87cd5b47b9877c2846968289a7551181 
1717460656439d33cb3f002807c2be939e3a072bbf7b4f9bdf0c7e5643b2db0eff6de8922a65cbc28fefa31442235.exe 978432  e7113b496e6c563a83eb5334ce50de43 
4fa1a737e0f11cb5dda7ba51bc55ce76.vir.exe 188416  4fa1a737e0f11cb5dda7ba51bc55ce76 
2c0ee7bf53c8f777d741babd955b05a5.vir.exe 188416  2c0ee7bf53c8f777d741babd955b05a5 
a36920e1617782ee32dda1b33bce3933.vir.exe 188416  a36920e1617782ee32dda1b33bce3933 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware