Home / Spyware Encyclopedia / Rootkit.Agent.bfmm << Back

Recommendation to Automatically remove Rootkit.Agent.bfmm


Our products can remove Rootkit.Agent.bfmm and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfmm Details


  • Category Rootkit
  • Discovered 1/11/2012 2:34:06 PM
  • Modified 7/10/2023 6:31:38 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5f5dc894bec80c4ef9ad3a2df7d9cecd3761e25614fc425bab2ae33be2f6eac7a80691c2138340e3d846623f76ac1cb7f67.exe 976896  a5ece2e121ac6b296c7004a47a5b0d8c 
3c813bcfc25a3aa0d5a348b8eb721c1d.exe 978432  3c813bcfc25a3aa0d5a348b8eb721c1d 
ff33cb3e64f493863dc031f2fb715dff.vir.exe 976896  ff33cb3e64f493863dc031f2fb715dff 
4118fa619e3ea89812b395896aa65261.vir.exe 192512  4118fa619e3ea89812b395896aa65261 
b6f23b373b7e6f75e25156ebd6053f89.vir.exe 524288  b6f23b373b7e6f75e25156ebd6053f89 
191436048453b664147cfff0f845f0ffd6ba33c859d242fb9160c595461264451765046155544e1136a3dd2551da3.exe 978432  2baf70425cbe6f6764c54699b2490294 
af2fd920d103e892221f2fd27c75dea5.vir.exe 192512  af2fd920d103e892221f2fd27c75dea5 
c5d6d9893ed13c4583c2e387d9da7c38.vir.exe 40152  c5d6d9893ed13c4583c2e387d9da7c38 
af3373b3e73a46ba2b22ef8e451312fc.vir.exe 192512  af3373b3e73a46ba2b22ef8e451312fc 
986e289a9fb92f243e58ac5d201f184e859c4ebb86c90f23b59498983ec4bbe3.exe 201491  f7d980ebf1c1efec001623e1e85ce25b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware