Home / Spyware Encyclopedia / Rootkit.Agent.dfpk << Back

Recommendation to Automatically remove Rootkit.Agent.dfpk


Our products can remove Rootkit.Agent.dfpk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfpk Details


  • Category Rootkit
  • Discovered 4/8/2013 6:57:13 PM
  • Modified 12/28/2022 1:03:28 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
53d8c101a4be03b6143d9558f62938ac6fe2c9b8.bin.sys 48256  fe90ba60c76ecb20aea1dbdfa7c1a18c 
0f6a205a7e15ca7f21e7e6fc53b3c01eade28f0b.bin.sys 48256  6ef80f202324c6e4eb703e6a229decdb 
8e0b85ad41913ad4e90c82d33c8fa48a.vir.sys 48256  8e0b85ad41913ad4e90c82d33c8fa48a 
97a47c90cb41557b5962f9ed4b436439.vir.sys 48256  97a47c90cb41557b5962f9ed4b436439 
0f6a205a7e15ca7f21e7e6fc53b3c01eade28f0b.bin.sys 48256  6ef80f202324c6e4eb703e6a229decdb28/12/2022
4e7ba7f8fb65549971c240bbb3eff9aa.vir.sys 48256  4e7ba7f8fb65549971c240bbb3eff9aa 
48c71ba74dc3477161cf799fbd635ed7.vir.sys 48256  48c71ba74dc3477161cf799fbd635ed7 
6a315bfadabd01b3ffc999ccdb6fd553b81efbee.bin.sys 48256  1e61eb0177e986adc8c08af4ae1ebf7b 
15482709842b5f33e8eb3fc007d604f4058a3fb21430b69844c9ad74f0d1bfba8191234a85cccc0472a7fae5ec411.sys 48256  527670f1b1cab0f3b0d5f9d3e1ff042d 
20d2cc51b1a3c19a8491fb651a5ebcc8.sys 48256  20d2cc51b1a3c19a8491fb651a5ebcc8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware