Home / Spyware Encyclopedia / Rootkit.Agent.bdvg << Back

Recommendation to Automatically remove Rootkit.Agent.bdvg


Our products can remove Rootkit.Agent.bdvg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bdvg Details


  • Category Rootkit
  • Discovered 3/22/2010 3:10:43 PM
  • Modified 10/8/2021 2:47:52 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fe9114ec.exe 7040Lenovo (Beijing) Limited1.0.0.0e4456520638d1ecb9eee0af9fc23883708/10/2021
one.sys 7040Lenovo (Beijing) Limited1.0.0.0e4456520638d1ecb9eee0af9fc23883708/10/2021
1651510001162663a9bf658082465cc3ea30f40a4f96dc16a614958b5a7033d5250d575ccabdbf4b00481bb3a65d0.exe 978432  d8c028f1ea2ccf8099193ab0b30ba263 
e73169f2c1c6bedb05e67fd8ea4c8f927a0038c7a14babaf54c5f217d183016e.exe 978432  7cc3cbf05b287adcd36be7e261b308cd 
2504029f6e98143acd95947ecf39d594fe19ad01aa006b40ba441da4c44ddf2a.exe 103936  f9b7b79662766bcac6a469f43cfc8d2f 
72efa3cac0f6919f08fecf37625e6b41.exe 978432  72efa3cac0f6919f08fecf37625e6b41 
2e9baad70648eef47cb291c686ea814dc5f1b3a567961ef5fc12a7cf9ed25ddabbc9b765b8eda6d0298eb005bd70afeb0573fec08e06ded39879c91a3bae2d09.exe 116224  b4fd6df95a78ef5a24e375a75bb400d7 
one.sys 7040Lenovo (Beijing) Limited1.0.0.0e4456520638d1ecb9eee0af9fc238837 
fe9114ec.exe 7040Lenovo (Beijing) Limited1.0.0.0e4456520638d1ecb9eee0af9fc238837 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware