Home / Spyware Encyclopedia / Rootkit.Agent.bfmd << Back

Recommendation to Automatically remove Rootkit.Agent.bfmd


Our products can remove Rootkit.Agent.bfmd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bfmd Details


  • Category Rootkit
  • Discovered 7/3/2013 10:24:59 PM
  • Modified 7/31/2023 5:23:03 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
one.sys 7552Lenovo (Beijing) Limited1.0.0.00df7efd1be6bc8673af0710884871f2d 
a025f3596356c83e6c4e4e9895bf384833c3f3af1da010ba86b859e7ef803bf0_download.exe.exe 39066  44a5c3056f9fdf985a40fc1f0540e846 
7e53a538e85d835ae56a103183cda405.vir.exe 39066  7e53a538e85d835ae56a103183cda405 
19574701250cfb7f10711b1696c3e836c2fc6aad4ad6d7b6c877059997279925dc027ddae23b476526bef5e5f5a6d.exe 977920  36a3ba1528843e80f17c61d6838d17c0 
9d348097afeb453da418ead059ae2062.vir.exe 188416  9d348097afeb453da418ead059ae2062 
185016085973283f91719c315d27a069d784a128296fbf9570ad4e17a0724aaaa5a2d6b1cbc5864fa6b1259426ee8.exe 39088  fa866866b78fe5cdbf5bdb4960e2733a20/12/2022
056fcb8b7f952d061acb555a3f13c41d.vir.exe 188416  056fcb8b7f952d061acb555a3f13c41d 
4eb1da973dde0bd73cb9bf583bb8584c.vir.exe 188416  4eb1da973dde0bd73cb9bf583bb8584c 
0447314973fe9222bd21e20adcbdd735.vir.exe 188416  0447314973fe9222bd21e20adcbdd735 
e14944e31089e38baff149167178ff53.vir.exe 188416  e14944e31089e38baff149167178ff53 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware