Home / Spyware Encyclopedia / Rootkit.Agent.blen << Back

Recommendation to Automatically remove Rootkit.Agent.blen


Our products can remove Rootkit.Agent.blen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blen Details


  • Category Rootkit
  • Discovered 11/5/2011 2:54:02 AM
  • Modified 10/11/2024 3:29:55 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f09c49e53ca098a4cfd96c2837136e34.exe 102794  f09c49e53ca098a4cfd96c2837136e34 
d6a2d909aba35d3c59677fd85b922520.vxe.sys 3267  d6a2d909aba35d3c59677fd85b922520 
7d21a1b0ba1f151d78e476444e3b989a2561c90d.sys 3267  60a1c44fbcd49224c67716f3d76a8a97 
4dfaf607c886152a19837ccb9e6ad6d8.sys 3267  4dfaf607c886152a19837ccb9e6ad6d8 
f3b75a1e904cf3b082ca46c537151ea018782563fe98f02b1610628df896ec913e4c6e99ee4eaa703dffd78059ecd5501fc.sys 3267  bf627099b1dd48fec53a2f0d90349163 
5d28c90e7f17eb7b363970ba3219389e.exe_M.exe_IESY1.SBOX.sys 3267  ab1554a1077521d7a102a471f078a86d 
c17ea6c106b808188ce609b3ee88ed72.exe_IESY1.exe.sys 3267  3c1fca365c285bd13614ed1ff4ccd5cd 
3d3975322c051d79ca0d19c114a77f8db67a03891ce79c86fd0573edb823e3d1.sys 3267  0962fce6256e5b5e6402e67cb1a08bb5 
98dc6ab834909c0b7449901a53103697ce7746d2c0d65dca844ab44f5e7ea148.sys 3267  0c2f6e3911dc19bcb4c06e32f0e96e9b 
357f386634a2fa064f6d3ac777df8c5c9fa4d75b4fad272c8babdc0c721f0a7c.sys 3267  29e52037538bbe7debe0fcf8e0c51b9a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware