Home / Spyware Encyclopedia / Rootkit.Agent.bisf << Back

Recommendation to Automatically remove Rootkit.Agent.bisf


Our products can remove Rootkit.Agent.bisf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bisf Details


  • Category Rootkit
  • Discovered 10/6/2024 12:02:42 AM
  • Modified 10/7/2024 10:19:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ef2b5311.exe 12544  5ecdf34f0f020f34ddc6b07efb2527b4 
1d7e4a5be4f0c7da9a0c1ab23b37b8e4.exe 3421696 1.0.0.11d7e4a5be4f0c7da9a0c1ab23b37b8e4 
e90942671be20bcd7a167bacb89439906c49dc7ed279080e83ceac62bcd7a9b5fd30e743c20ec5b277412b32ca0d1590add.exe 3640320 1, 0, 0, 1c2efec6f5660c3129be0f6a74421a5d8 
ee309910163b0da0215907cf91fce0f9edafc0bd.exe 3390464 1, 0, 0, 1a2ab229727b4b24d2549e3e0d8f7758d 
2.exe 1612288 1, 0, 0, 1e02767c97152a92bc24ebd643823f3cd 
4.exe 3022848 1, 0, 0, 11e230f6af559306076ff540bb5ef9900 
2.exe 1918976 1, 0, 0, 1a3a69a8a265ab8ecdbb73f4f7ca9d005 
5.exe 3411456 1, 0, 0, 1f3c3a90a8916a6c6bd7d510d6f3d55a3 
5ba9dde253403d5dbd7335eef8618a85d4da73cdaf8505d25aeb814dfe54b11da45e1de53f46a347ae7c56de1aaa880031f.exe 2864128 1, 0, 0, 146f441d8fec6844172d86ecbf97c3502 
1.exe 1976320 1, 0, 0, 1b0937773ed321ccaad9dabdcaa6573a1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware