Home / Spyware Encyclopedia / Rootkit.Agent.bnan << Back

Recommendation to Automatically remove Rootkit.Agent.bnan


Our products can remove Rootkit.Agent.bnan and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnan Details


  • Category Rootkit
  • Discovered 4/12/2012 7:23:18 PM
  • Modified 3/4/2024 10:11:17 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5a27f223782e68a29516da30d20e68b0.vir.exe 166768  5a27f223782e68a29516da30d20e68b0 
e7d6f20c3cdf64c4297723e8c3cadb8e.vir.exe 166400  e7d6f20c3cdf64c4297723e8c3cadb8e 
669055c27d659c468a568c02a4375173.vir.exe 16909  170e376eeb84744638c1512a6a11463e 
01949a1b8ba9c9ca4c5b7204f929b743.vir.exe 16384  01949a1b8ba9c9ca4c5b7204f929b743 
4ae879e2895acb10268aa6acd1527b5ec333c6b124fa4010eb73944319c4e88835a0723c16f257d66d440f0fbc9ccd2b3adc972441c0e2a2b108c0480f07461c.exe 16384  648951e225eb6b2399b6026442287d4e 
246c09bb79821003e31d4f0740c5ebea.exe 121344  246c09bb79821003e31d4f0740c5ebea 
a66414f2bbb876d177af203d7ae4840f.vir.exe 240496  a66414f2bbb876d177af203d7ae4840f 
729eddd81dccceee8d66e8cf7d97251a.vir.exe 166144  729eddd81dccceee8d66e8cf7d97251a 
066c231f58b239e75196ae92cb8e7937.vir.exe 16911  409fe833a2dcd844ade30fc5f09acdbd 
ac8d09696350227fd90d15d84a188fdd.vir.exe 166768  ac8d09696350227fd90d15d84a188fdd 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware