Home / Spyware Encyclopedia / Rootkit.KernelBot.bp << Back

Recommendation to Automatically remove Rootkit.KernelBot.bp


Our products can remove Rootkit.KernelBot.bp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.KernelBot.bp Details


  • Category Rootkit
  • Discovered 12/9/2023 10:59:14 PM
  • Modified 12/11/2023 10:09:19 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.kernelbot.ak 64512  2e6efe1932fc93601b049fdaffbfb6ee 
trojan-downloader.win32.agent.rsx 64512  a07946d657a42f4ff76aa39a7f3ac5d1 
485bf07e2ac54aab746f07e2a2082f0d.exe 213260  485bf07e2ac54aab746f07e2a2082f0d 
7537a41462ce2530140d35ed8740e513.sys 64972  7537a41462ce2530140d35ed8740e513 
64fb26cac88a108ef60b05ca7e6945a6349ceecf44b5b9cdcdb821a5862e9f88.sys 69028  4dfc1f7c8feb5f16d57b6b8f56a322fe 
17a5a77ffa5e93532a638721860b2ea10394578515f29e5ac0afb9a727519f75.sys 69052  34f76e49f22be70344f921b7e9efdd4a 
02f2eb1f6853a9d7798fd08288644a17.vir.sys 69008  02f2eb1f6853a9d7798fd08288644a17 
da4b83e678080921df8be424fe79b40f3627571bfb781bd0015e2baa2354501d.sys 64956  9d8ff1abf3d950f01795fe681fd22c05 
adbd12e09c932aa24018a35b7d9cab0f.vir.sys 69008  adbd12e09c932aa24018a35b7d9cab0f 
659d090b301d2aee4a896b230ca1ea53.vir.sys 64512  659d090b301d2aee4a896b230ca1ea53 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware