Home / Spyware Encyclopedia / Rootkit.Agent.blbf << Back

Recommendation to Automatically remove Rootkit.Agent.blbf


Our products can remove Rootkit.Agent.blbf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.blbf Details


  • Category Rootkit
  • Discovered 3/27/2013 5:28:43 AM
  • Modified 8/3/2023 5:33:37 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
06a9f71a4297000fe2346c5fe8bd0f1d.sys 6536  06a9f71a4297000fe2346c5fe8bd0f1d 
0f6536f4f448a6585722bcb2bfc6114b.sys 6536  0f6536f4f448a6585722bcb2bfc6114b 
4a48bb6141585dcb97f31fd1b678bc0a.sys 6536  4a48bb6141585dcb97f31fd1b678bc0a 
5c38cb2fed3a79c98dde38bcf9ff81b0.sys 6536  5c38cb2fed3a79c98dde38bcf9ff81b0 
90652d539794a61ab4ec5039a6bdd040.sys 6536  90652d539794a61ab4ec5039a6bdd040 
e37798cbd294974127641cea1f94281b.sys 6536  e37798cbd294974127641cea1f94281b 
1904220093202b5d0b0e34f74f6fbbf196efedf658a89270c1db7f0ce62b895cb2cf412e9e54d5d6e6fffc9aa7e1a.sys 6536  47dd54f57dad3d1004f4f500ae823202 
f750b9bf4a4401310cac65086c3cc4e9467d191cba7e4d7e11114a7a45c35c9c.sys 6536  1e0d09c0aa6cd93b52b0e3e7f2454850 
07e6a85ccd2230b63cb7758351e0458b.vir.sys 6536  07e6a85ccd2230b63cb7758351e0458b 
4cab4219d4c1d479d05fed6f3a5435db.dll 157191Microsoft Corporation5.1.2600.2180 (xpsp4cab4219d4c1d479d05fed6f3a5435db18/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware