Home / Spyware Encyclopedia / Rootkit.Agent.bnes << Back

Recommendation to Automatically remove Rootkit.Agent.bnes


Our products can remove Rootkit.Agent.bnes and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnes Details


  • Category Rootkit
  • Discovered 8/1/2015 2:21:25 AM
  • Modified 7/22/2023 10:53:25 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fc885d2daf820418f83e0d8df67de020.sys 14496  fc885d2daf820418f83e0d8df67de020 
46869b3b5c456cb0e61909c1b4bb06b0.sys 11080  46869b3b5c456cb0e61909c1b4bb06b0 
4ac5d0ccf503317ec36393911c2541f6.sys 13128  4ac5d0ccf503317ec36393911c2541f6 
14e73e915b115d0ebb045330e525bc480550304b20c5fc8c8cedcf8634858130.dll 159236Microsoft Corporation5.1.2600.2180 (xpsp86142ab910eea88d89c38ae2bb91a362 
14e73e915b115d0ebb045330e525bc480550304b20c5fc8c8cedcf8634858130_avlu.sys.exe.sys 17104  1c5bdb069644099508782a626b90a6a2 
1c4a952d6e375ef8db221f3e0450dfec68b54a460df8cec1e0c95b0185b12396.sys 14496  076b0933ee28d06116511ab1a78e7a6f 
ea1213f68b9e07194262f429aee6e8d9.sys 11080  ea1213f68b9e07194262f429aee6e8d9 
cd68d6b54b8909958f81fe2da43c6897.vir.sys 13224  cd68d6b54b8909958f81fe2da43c6897 
f19058decf988b4a68fce60dd4829123.vir.sys 13184  f19058decf988b4a68fce60dd4829123 
3d1ab1cd7503e9e780c7bad47632bdc3.vir.sys 13184  3d1ab1cd7503e9e780c7bad47632bdc3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware