Home / Spyware Encyclopedia / Rootkit.Agent.blbf << Back

Recommendation to Automatically remove Rootkit.Agent.blbf


Our products can remove Rootkit.Agent.blbf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blbf Details


  • Category Rootkit
  • Discovered 3/27/2013 5:28:43 AM
  • Modified 8/3/2023 5:33:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0f6536f4f448a6585722bcb2bfc6114b.sys 6536  0f6536f4f448a6585722bcb2bfc6114b 
1904220093202b5d0b0e34f74f6fbbf196efedf658a89270c1db7f0ce62b895cb2cf412e9e54d5d6e6fffc9aa7e1a.sys 6536  47dd54f57dad3d1004f4f500ae823202 
f750b9bf4a4401310cac65086c3cc4e9467d191cba7e4d7e11114a7a45c35c9c.sys 6536  1e0d09c0aa6cd93b52b0e3e7f2454850 
1cd80da98c272f48284cab66fda74402c6662f0d.bin.sys 6536  cb8de0d12e0d396f43b1459dcb21169b 
6d79abd280c1943b2cad323a0ba5792d.vir.sys 6536  6d79abd280c1943b2cad323a0ba5792d 
e7b2ebf409ef7b4e3a20aa54eeef37d9.vir.sys 6536  e7b2ebf409ef7b4e3a20aa54eeef37d9 
90652d539794a61ab4ec5039a6bdd040.sys 6536  90652d539794a61ab4ec5039a6bdd040 
78c590dd21f971c49dde886ec5ef5bf33ed3a07666fbe3c9c70f42028fd39e72.sys 6536  efdd489f808700113476dd1308c7c749 
5c38cb2fed3a79c98dde38bcf9ff81b0.sys 6536  5c38cb2fed3a79c98dde38bcf9ff81b0 
4a48bb6141585dcb97f31fd1b678bc0a.sys 6536  4a48bb6141585dcb97f31fd1b678bc0a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware