Home / Spyware Encyclopedia / Rootkit.Agent.blen << Back

Recommendation to Automatically remove Rootkit.Agent.blen


Our products can remove Rootkit.Agent.blen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blen Details


  • Category Rootkit
  • Discovered 11/5/2011 2:54:02 AM
  • Modified 10/11/2024 3:29:55 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f09c49e53ca098a4cfd96c2837136e34.exe 102794  f09c49e53ca098a4cfd96c2837136e34 
4ed8f3452c1759a94e3bbbe2907af54f.exe_IESY1.exe.sys 3267  8bf15b59dea608d052be5d87ad068249 
7d21a1b0ba1f151d78e476444e3b989a2561c90d.sys 3267  60a1c44fbcd49224c67716f3d76a8a97 
4dfaf607c886152a19837ccb9e6ad6d8.sys 3267  4dfaf607c886152a19837ccb9e6ad6d8 
c17ea6c106b808188ce609b3ee88ed72.exe_IESY1.exe.sys 3267  3c1fca365c285bd13614ed1ff4ccd5cd 
5d28c90e7f17eb7b363970ba3219389e.exe_M.exe_IESY1.SBOX.sys 3267  ab1554a1077521d7a102a471f078a86d 
a1f2adb7e19bca762ac09350d6672d2b.sys 3267  a1f2adb7e19bca762ac09350d6672d2b 
3d3975322c051d79ca0d19c114a77f8db67a03891ce79c86fd0573edb823e3d1.sys 3267  0962fce6256e5b5e6402e67cb1a08bb5 
357f386634a2fa064f6d3ac777df8c5c9fa4d75b4fad272c8babdc0c721f0a7c.sys 3267  29e52037538bbe7debe0fcf8e0c51b9a 
3c21e3124b061697b78287cf4f013c5b.sys 3267  3c21e3124b061697b78287cf4f013c5b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware