Home / Spyware Encyclopedia / Rootkit.Agent.bdzr << Back

Recommendation to Automatically remove Rootkit.Agent.bdzr


Our products can remove Rootkit.Agent.bdzr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bdzr Details


  • Category Rootkit
  • Discovered 4/19/2011 4:22:59 PM
  • Modified 8/9/2023 3:11:27 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f1c3123b44af6c164825c82b4398cb34.exe 15392  f1c3123b44af6c164825c82b4398cb34 
e906a6f35641bf2b10ff7c8ba9555c6847ad236adcd5ea20f066c88ba39dbf8b.sys 15392  cfd260682224f663a895cd7b508a107e 
b420aaa826b3ecab234dad21d7a26831.sys 32768  b420aaa826b3ecab234dad21d7a26831 
654490a6a75cd273846a0bc0a474fa6c67039bab58e665f720d3cad410b89d1e.sys 15392  7dc5fd3150420c632e40133d53547760 
virusshare_820862501de44af44b377f9451cc7fa0.sys 32768  820862501de44af44b377f9451cc7fa030/07/2023
654490a6a75cd273846a0bc0a474fa6c67039bab58e665f720d3cad410b89d1e.sys 15392  7dc5fd3150420c632e40133d5354776004/08/2023
A2DDFBED9619F06D4A2A651EEAFA9267B200F1DA.{OVL}{PE} 0  4471f0860973a0eff67376ec6f83094f09/08/2023
1043279_000073647-933E2FC8_cb637ccd402e09dd2eb552e85f95afa0.EXE_atixi.sys.SBOX.sys 15392  ff552770f7f475a13d85514f9448edcd09/08/2023
53e1e0e2.exe 15392  f1c3123b44af6c164825c82b4398cb34 
atixx.sys 15392  cc4b907d3725fd620c2b93ad42fb383a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware