Home / Spyware Encyclopedia / Rootkit.Agent.dfpk << Back

Recommendation to Automatically remove Rootkit.Agent.dfpk


Our products can remove Rootkit.Agent.dfpk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfpk Details


  • Category Rootkit
  • Discovered 4/8/2013 6:57:13 PM
  • Modified 12/28/2022 1:03:28 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
aff2fea6f588b7e6b5a52bfa43555259dba2deb89c961580f311442decf7fd62.sys 48256  7fa209d1c5e57c49fcc561c0778e1294 
15482709842b5f33e8eb3fc007d604f4058a3fb21430b69844c9ad74f0d1bfba8191234a85cccc0472a7fae5ec411.sys 48256  527670f1b1cab0f3b0d5f9d3e1ff042d 
0f6a205a7e15ca7f21e7e6fc53b3c01eade28f0b.bin.sys 48256  6ef80f202324c6e4eb703e6a229decdb 
53d8c101a4be03b6143d9558f62938ac6fe2c9b8.bin.sys 48256  fe90ba60c76ecb20aea1dbdfa7c1a18c 
6a315bfadabd01b3ffc999ccdb6fd553b81efbee.bin.sys 48256  1e61eb0177e986adc8c08af4ae1ebf7b 
48c71ba74dc3477161cf799fbd635ed7.vir.sys 48256  48c71ba74dc3477161cf799fbd635ed7 
8e0b85ad41913ad4e90c82d33c8fa48a.vir.sys 48256  8e0b85ad41913ad4e90c82d33c8fa48a 
0f6a205a7e15ca7f21e7e6fc53b3c01eade28f0b.bin.sys 48256  6ef80f202324c6e4eb703e6a229decdb28/12/2022
97a47c90cb41557b5962f9ed4b436439.vir.sys 48256  97a47c90cb41557b5962f9ed4b436439 
4e7ba7f8fb65549971c240bbb3eff9aa.vir.sys 48256  4e7ba7f8fb65549971c240bbb3eff9aa 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware