Home / Spyware Encyclopedia / Rootkit.Agent.blen << Back

Recommendation to Automatically remove Rootkit.Agent.blen


Our products can remove Rootkit.Agent.blen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blen Details


  • Category Rootkit
  • Discovered 3/23/2011 3:04:15 PM
  • Modified 3/12/2024 12:54:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f09c49e53ca098a4cfd96c2837136e34.exe 102794  f09c49e53ca098a4cfd96c2837136e34 
4ed8f3452c1759a94e3bbbe2907af54f.exe_IESY1.exe.sys 3267  8bf15b59dea608d052be5d87ad068249 
7d21a1b0ba1f151d78e476444e3b989a2561c90d.sys 3267  60a1c44fbcd49224c67716f3d76a8a97 
4dfaf607c886152a19837ccb9e6ad6d8.sys 3267  4dfaf607c886152a19837ccb9e6ad6d8 
5d28c90e7f17eb7b363970ba3219389e.exe_M.exe_IESY1.SBOX.sys 3267  ab1554a1077521d7a102a471f078a86d 
3d3975322c051d79ca0d19c114a77f8db67a03891ce79c86fd0573edb823e3d1.sys 3267  0962fce6256e5b5e6402e67cb1a08bb5 
b84e40dbc90575a2c350f6fd9f94cbe8.vir.sys 3267  b84e40dbc90575a2c350f6fd9f94cbe8 
37d94f8a19e8f87fb6c65fb5f8a63698.sys 3267  37d94f8a19e8f87fb6c65fb5f8a6369829/07/2022
de1ae0675d2d7647492a7fe61c7cc754.exe_M.exe_IESY1.SBOX.sys 3267  196b9a248baf9f5a8ba12e4d0d7e611509/01/2023
1332218_000003267-FEAC1F3A_487c0c210e46e962682fc47fadfbe474.EXE.sys 3267  487c0c210e46e962682fc47fadfbe47418/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware