Home / Spyware Encyclopedia / Rootkit.Agent.bfmm << Back

Recommendation to Automatically remove Rootkit.Agent.bfmm


Our products can remove Rootkit.Agent.bfmm and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfmm Details


  • Category Rootkit
  • Discovered 1/11/2012 2:34:06 PM
  • Modified 7/10/2023 6:31:38 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5f5dc894bec80c4ef9ad3a2df7d9cecd3761e25614fc425bab2ae33be2f6eac7a80691c2138340e3d846623f76ac1cb7f67.exe 976896  a5ece2e121ac6b296c7004a47a5b0d8c 
b820e3b089be7b31f284d43fc0df04cc.exe 977920  b820e3b089be7b31f284d43fc0df04cc 
1223180056365d0a413fe8a76e9c598f5724e0cea781bf8225c957b43cea0cf221b17225e681fbc52a5f4dc72410a.exe 978432  6a487ac5755310461263ed1c8a79fd73 
73dc92089e144bcf083614602b7f32e1.vir.exe 978432  73dc92089e144bcf083614602b7f32e1 
c5d6d9893ed13c4583c2e387d9da7c38.vir.exe 40152  c5d6d9893ed13c4583c2e387d9da7c38 
af2fd920d103e892221f2fd27c75dea5.vir.exe 192512  af2fd920d103e892221f2fd27c75dea5 
b6f23b373b7e6f75e25156ebd6053f89.vir.exe 524288  b6f23b373b7e6f75e25156ebd6053f89 
ff33cb3e64f493863dc031f2fb715dff.vir.exe 976896  ff33cb3e64f493863dc031f2fb715dff 
4118fa619e3ea89812b395896aa65261.vir.exe 192512  4118fa619e3ea89812b395896aa65261 
06d195ce0c9b9b011eec1ff4d65e7bf6.vir.exe 192512  06d195ce0c9b9b011eec1ff4d65e7bf6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware