Home / Spyware Encyclopedia / Rootkit.Agent.bnan << Back

Recommendation to Automatically remove Rootkit.Agent.bnan


Our products can remove Rootkit.Agent.bnan and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnan Details


  • Category Rootkit
  • Discovered 4/12/2012 7:23:18 PM
  • Modified 3/4/2024 10:11:17 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4ae879e2895acb10268aa6acd1527b5ec333c6b124fa4010eb73944319c4e88835a0723c16f257d66d440f0fbc9ccd2b3adc972441c0e2a2b108c0480f07461c.exe 16384  648951e225eb6b2399b6026442287d4e 
9117c57385ee58b17e0ce7c1d6e948907a58986216fa8488f40da5e89ad61b02.exe 252865  06bd488eee35a94d99cccead5581ee46 
e7d6f20c3cdf64c4297723e8c3cadb8e.vir.exe 166400  e7d6f20c3cdf64c4297723e8c3cadb8e 
5a27f223782e68a29516da30d20e68b0.vir.exe 166768  5a27f223782e68a29516da30d20e68b0 
669055c27d659c468a568c02a4375173.vir.exe 16909  170e376eeb84744638c1512a6a11463e 
a66414f2bbb876d177af203d7ae4840f.vir.exe 240496  a66414f2bbb876d177af203d7ae4840f 
729eddd81dccceee8d66e8cf7d97251a.vir.exe 166144  729eddd81dccceee8d66e8cf7d97251a 
a365f395b12fd6a795b34ac477690ca3.vir.exe 166768  a365f395b12fd6a795b34ac477690ca3 
066c231f58b239e75196ae92cb8e7937.vir.exe 16911  409fe833a2dcd844ade30fc5f09acdbd 
77224b4853c25b312d4434eb4eddefb4.vir.exe 166768  77224b4853c25b312d4434eb4eddefb4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware