Home / Spyware Encyclopedia / Rootkit.Agent.bnan << Back

Recommendation to Automatically remove Rootkit.Agent.bnan


Our products can remove Rootkit.Agent.bnan and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnan Details


  • Category Rootkit
  • Discovered 4/12/2012 7:23:18 PM
  • Modified 3/4/2024 10:11:17 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
246c09bb79821003e31d4f0740c5ebea.exe 121344  246c09bb79821003e31d4f0740c5ebea 
9117c57385ee58b17e0ce7c1d6e948907a58986216fa8488f40da5e89ad61b02.exe 252865  06bd488eee35a94d99cccead5581ee46 
163920075160ee56223baf070bf4b37606fcf3ee1ab103c583054d96f836cb0f0018c6664883ae6b15a206755e3bc.exe 16831  f2fe63a09a735fedfa1f9393bfac005e 
e8e4e8007e0688f240ae211e40d18e2b89170d52b022f1c0512ba307c91b632c.exe 412672  bfa9b98faae7e6193f2cd750675be585 
5a27f223782e68a29516da30d20e68b0.vir.exe 166768  5a27f223782e68a29516da30d20e68b0 
a365f395b12fd6a795b34ac477690ca3.vir.exe 166768  a365f395b12fd6a795b34ac477690ca3 
669055c27d659c468a568c02a4375173.vir.exe 16909  170e376eeb84744638c1512a6a11463e 
a66414f2bbb876d177af203d7ae4840f.vir.exe 240496  a66414f2bbb876d177af203d7ae4840f 
729eddd81dccceee8d66e8cf7d97251a.vir.exe 166144  729eddd81dccceee8d66e8cf7d97251a 
a6f2cd31adca6975277d6953df913413.vir.exe 236400  a6f2cd31adca6975277d6953df913413 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware