Home / Spyware Encyclopedia / Rootkit.Agent.bnan << Back

Recommendation to Automatically remove Rootkit.Agent.bnan


Our products can remove Rootkit.Agent.bnan and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bnan Details


  • Category Rootkit
  • Discovered 4/12/2012 7:23:18 PM
  • Modified 3/4/2024 10:11:17 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d68e390e704c19624aa9adfb8144ec4332437b4e.bin.exe 16850  35a06bea3218ace099ab97be6716a181 
9117c57385ee58b17e0ce7c1d6e948907a58986216fa8488f40da5e89ad61b02.exe 252865  06bd488eee35a94d99cccead5581ee46 
163920075160ee56223baf070bf4b37606fcf3ee1ab103c583054d96f836cb0f0018c6664883ae6b15a206755e3bc.exe 16831  f2fe63a09a735fedfa1f9393bfac005e 
e8e4e8007e0688f240ae211e40d18e2b89170d52b022f1c0512ba307c91b632c.exe 412672  bfa9b98faae7e6193f2cd750675be585 
01949a1b8ba9c9ca4c5b7204f929b743.vir.exe 16384  01949a1b8ba9c9ca4c5b7204f929b743 
5a27f223782e68a29516da30d20e68b0.vir.exe 166768  5a27f223782e68a29516da30d20e68b0 
cc76efc3b8ad4216ac43bf5ab031e2d4.vir.exe 166768  cc76efc3b8ad4216ac43bf5ab031e2d4 
e7d6f20c3cdf64c4297723e8c3cadb8e.vir.exe 166400  e7d6f20c3cdf64c4297723e8c3cadb8e 
669055c27d659c468a568c02a4375173.vir.exe 16909  170e376eeb84744638c1512a6a11463e 
a66414f2bbb876d177af203d7ae4840f.vir.exe 240496  a66414f2bbb876d177af203d7ae4840f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware