Home / Spyware Encyclopedia / Rootkit.Agent.dfzg << Back

Recommendation to Automatically remove Rootkit.Agent.dfzg


Our products can remove Rootkit.Agent.dfzg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfzg Details


  • Category Rootkit
  • Discovered 11/7/2012 11:16:25 PM
  • Modified 8/9/2023 3:11:58 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
37f50f3d36165b9458d22ff0e06edb2f.sys 37760  37f50f3d36165b9458d22ff0e06edb2f 
208f19b6c6bce7e0e0a87af0d7b99d55.sys 37760  208f19b6c6bce7e0e0a87af0d7b99d55 
c0e39c5c703249d207328f23d7e64a51b718faefe320227fad0e3a8ff3b6bd36.sys 37760  8aada614172ce77b4febaa3589fb4368 
24a3b2d41fd96a339d839e84d343d85deb143e340d8e3bafce50e8421dfd7e63.sys 37760  3e78f11bc6b68bef8c4525dd7f6b775d 
51733449701f747e1b231eaadffed93c.sys 37760  51733449701f747e1b231eaadffed93c 
e0aa7f6404e0acba356357f5b85edcc4.sys 37760  e0aa7f6404e0acba356357f5b85edcc4 
e9843824530ee83be5df4c00bbd3d63ab9f9ebfc0406ff9b1007b9a8ebb3a00b.sys 37760  36e029c5cf44ccd1e279d7ea4855c6d5 
263000777d116d4943364076ac727189.vir.sys 37760  263000777d116d4943364076ac727189 
5e0873c72e2ccd312542b8d55a378fb0.vir.sys 37760  5e0873c72e2ccd312542b8d55a378fb0 
697e800e0b2a5ceeb7e123ede43dbd50.vir.sys 37760  697e800e0b2a5ceeb7e123ede43dbd50 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware