Home / Spyware Encyclopedia / Rootkit.Agent.blen << Back

Recommendation to Automatically remove Rootkit.Agent.blen


Our products can remove Rootkit.Agent.blen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blen Details


  • Category Rootkit
  • Discovered 3/23/2011 3:04:15 PM
  • Modified 3/12/2024 12:54:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
commdlg.drv 3267  398f61a8db45e1995ee66a8099cd7fad 
f09c49e53ca098a4cfd96c2837136e34.exe 102794  f09c49e53ca098a4cfd96c2837136e34 
5458c3dd01d5895d1f51c18c87220320.sys 3267  5458c3dd01d5895d1f51c18c87220320 
d6a2d909aba35d3c59677fd85b922520.vxe.sys 3267  d6a2d909aba35d3c59677fd85b922520 
4ed8f3452c1759a94e3bbbe2907af54f.exe_IESY1.exe.sys 3267  8bf15b59dea608d052be5d87ad068249 
0e297a17888ee70d694c004fcab0a455.exe_IESY1.exe.sys 3267  533e93cca21f476720f5dbfb2ec793ea 
4dfaf607c886152a19837ccb9e6ad6d8.sys 3267  4dfaf607c886152a19837ccb9e6ad6d8 
c17ea6c106b808188ce609b3ee88ed72.exe_IESY1.exe.sys 3267  3c1fca365c285bd13614ed1ff4ccd5cd 
032a1c5c79c44489fbc677b80b13dbb6.sys 3267  032a1c5c79c44489fbc677b80b13dbb6 
2903348e62184276f786911c1d317d8557c199a94a65eac04289f18eee4d9df637827eb554f78c179774e433663cc394ba3.sys 3267  e4eb17ed9e88b01183fbd7183de41c56 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware