Home / Spyware Encyclopedia / Rootkit.Agent.bnei << Back

Recommendation to Automatically remove Rootkit.Agent.bnei


Our products can remove Rootkit.Agent.bnei and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnei Details


  • Category Rootkit
  • Discovered 10/8/2012 5:21:28 PM
  • Modified 7/24/2023 3:07:57 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
083aa73e42ef9caf4c63c3af76f6e686968ac06fd87d535328fa92c3baf79c48729323babd8a52786f13c75bbf58abb9515.exe 358400  4fb66c366e87ccceab36b7ff99e091a9 
be6cf052664d03af305a16b3573e1f16794ed6af9470ef9d5a140a145048571c.exe 358400  abcb2ebaa27e8e5913ddd9dfce3b400b 
c2db2ff8008072be651776527526e98f.exe 358400  c2db2ff8008072be651776527526e98f 
d4fdfa04e21543b40cb190d0b292f01e.exe 358400  d4fdfa04e21543b40cb190d0b292f01e 
087ad686bce58bb7d00ea1c7591f45ac.exe 358400  087ad686bce58bb7d00ea1c7591f45ac 
8bfae5d5a334dcab1e14f4429017465a.exe 358400  8bfae5d5a334dcab1e14f4429017465a 
121419e7a7f418fb57e0415b5dd15117.exe 358400  121419e7a7f418fb57e0415b5dd15117 
ddb57127c1bdd244b77e67437c4c967201712e80.bin.exe 358400  fd1dbafcde565111c3835ab3af62314d 
da801388d56d419e494671d5548a89fa.exe 358400  da801388d56d419e494671d5548a89fa 
8fe3041bbcfe64ce8d74735f59943224.exe 358400  8fe3041bbcfe64ce8d74735f59943224 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware