Home / Spyware Encyclopedia / Rootkit.Agent.blen << Back

Recommendation to Automatically remove Rootkit.Agent.blen


Our products can remove Rootkit.Agent.blen and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blen Details


  • Category Rootkit
  • Discovered 11/5/2011 2:54:02 AM
  • Modified 10/11/2024 3:29:55 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
commdlg.drv 3267  398f61a8db45e1995ee66a8099cd7fad 
f09c49e53ca098a4cfd96c2837136e34.exe 102794  f09c49e53ca098a4cfd96c2837136e34 
5458c3dd01d5895d1f51c18c87220320.sys 3267  5458c3dd01d5895d1f51c18c87220320 
d6a2d909aba35d3c59677fd85b922520.vxe.sys 3267  d6a2d909aba35d3c59677fd85b922520 
7d21a1b0ba1f151d78e476444e3b989a2561c90d.sys 3267  60a1c44fbcd49224c67716f3d76a8a97 
4dfaf607c886152a19837ccb9e6ad6d8.sys 3267  4dfaf607c886152a19837ccb9e6ad6d8 
5d28c90e7f17eb7b363970ba3219389e.exe_M.exe_IESY1.SBOX.sys 3267  ab1554a1077521d7a102a471f078a86d 
a1f2adb7e19bca762ac09350d6672d2b.sys 3267  a1f2adb7e19bca762ac09350d6672d2b 
032a1c5c79c44489fbc677b80b13dbb6.sys 3267  032a1c5c79c44489fbc677b80b13dbb6 
1d7ba5821272d13ea8a52f68dc5c430f.sys 3267  1d7ba5821272d13ea8a52f68dc5c430f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware