Home / Spyware Encyclopedia / Rootkit.Agent.bisf << Back

Recommendation to Automatically remove Rootkit.Agent.bisf


Our products can remove Rootkit.Agent.bisf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bisf Details


  • Category Rootkit
  • Discovered 10/6/2024 12:02:42 AM
  • Modified 10/7/2024 10:19:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1d7e4a5be4f0c7da9a0c1ab23b37b8e4.exe 3421696 1.0.0.11d7e4a5be4f0c7da9a0c1ab23b37b8e4 
67d74e0aebdb68194697d36f237fd1501d3d530b.exe 3421696 1, 0, 0, 1b84b9919325487605c6a39a9751e9dac 
18f480a2718286cdb82c48d7394f804d21c4a26b1ce6454e0a122cccc1d61e130a0379b0b24d5c1f917eb1dd193ee16f2be.exe 3483136 1, 0, 0, 184b299285a0eb07319b2ff4a7c835e7c 
2.exe 1918976 1, 0, 0, 1a3a69a8a265ab8ecdbb73f4f7ca9d005 
2.exe 2296832 1, 0, 0, 127627eeddfde32348ebf8d80e3892833 
5.exe 2230272 1, 0, 0, 118493a79a19a8f0de7e1b5c4cf067c36 
f3f54765e1013613133251491d2e9b90dc3f2377.bin.exe 3451904 1, 0, 0, 1b363064c1fef78e38961fba760d6e413 
4ed11ef07268ba34a866023863c351b1.exe 2043392 1, 0, 0, 14ed11ef07268ba34a866023863c351b1 
67d74e0aebdb68194697d36f237fd1501d3d530b.exe 3421696 1.0.0.1b84b9919325487605c6a39a9751e9dac 
46a6c8379df44f2227ad3d8c6f0a4cb2f65e1da6.exe 3482624 1.0.0.1358666b6e78bfbfb2f89c5db1e1f4e41 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware