Home / Spyware Encyclopedia / Rootkit.Agent.bldn << Back

Recommendation to Automatically remove Rootkit.Agent.bldn


Our products can remove Rootkit.Agent.bldn and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bldn Details


  • Category Rootkit
  • Discovered 4/22/2022 9:47:29 AM
  • Modified 4/22/2022 2:53:39 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
05ff5f42e1b78746fa411a0a3c037c9b.sys 32768  05ff5f42e1b78746fa411a0a3c037c9b 
f93b37f11c7b634d1e61f13f0e3b092d.sys 32256  f93b37f11c7b634d1e61f13f0e3b092d 
bcbb0952ab7d8981ce554416c68e946a.sys 31612  bcbb0952ab7d8981ce554416c68e946a 
339ba97692aae26992b6c24f1007abf9ccac33f1d3218d521723f0ddd2a70c4e.sys 32123  41550745a9e024ba195409bce15837dc 
756a7fb39c2ddd42e76af867f0879b22ad5f572421ca26ea4ffa8dd5bfdbe295.mrg.exe 32768  835a358427a84c9a808ca869388e048622/04/2022
15574100151a4e2559a0849f75263b94dd6fd633794213045d8cf7c80b7bc8153395985760380c8e7e4fcdc1d7d50.sys 32256  4615a4bcdc4f4b30410b01ce7fa27a1c 
469b54a352d38f16f794b479c42e40f07c970431f78b7e26655dc5638b1ce935.sys 32256  f32ac5b25ee6fd8486cc8253b5831342 
41fd330f3369cc2be97cf487680febea.sys 32768  41fd330f3369cc2be97cf487680febea 
c0e4dd828099f2025c8cde9aca63ec27.sys 32768  c0e4dd828099f2025c8cde9aca63ec27 
62592a82b04a013561079bb153bb9dee.sys 32125  62592a82b04a013561079bb153bb9dee 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware