Home / Spyware Encyclopedia / Rootkit.Agent.bipu << Back

Recommendation to Automatically remove Rootkit.Agent.bipu


Our products can remove Rootkit.Agent.bipu and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bipu Details


  • Category Rootkit
  • Discovered 7/3/2011 5:27:25 PM
  • Modified 10/11/2024 3:28:36 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
95bef166.exe 6280  65c73ec6704893dbf6123c56cfde4c5c 
45199485b0373dbd1aa33d978e21b7c2.sys 6280  45199485b0373dbd1aa33d978e21b7c2 
277668676cc62df7fedd8a586d862ceb37fb0161aafca852ba279a5d1731b725.sys 6280  9ad41a0ec6dc3cd915f90f9a48f3915e 
20a308e458d7f12dc51b3b5bdaacb4d2.sys 6280  20a308e458d7f12dc51b3b5bdaacb4d211/10/2024
B25FC5979F8F8349D5B14EF3811F5966918A21CA8E9D772AA492208716724899.MRG.sys 6280  23254e7af964aaaf65265229562ef60311/10/2024
70d7978a89caf7927b680415bd6dafd7.sys 6280  70d7978a89caf7927b680415bd6dafd709/08/2023
3e161211986a9540b2fce1f49dc74bae.vir.sys 6280  3e161211986a9540b2fce1f49dc74bae 
053a4515fcb6982ca5d5856594f4917f0a14721a6a39ce674a322a5e9480bf5b.sys 6280  b7bbaa2dac57a11af5dc580ac9b30fa9 
30333234eac3c60f6192b3300af408421b125139e2063802d004dac13245037e_dfou.sys.exe.sys 6280  ebd5d192291f8e208662aeaa547bfee1 
09644b99f481176121717d28a2d1ba96.sys 6280  09644b99f481176121717d28a2d1ba96 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware