Home / Spyware Encyclopedia / Rootkit.Agent.dfqc << Back

Recommendation to Automatically remove Rootkit.Agent.dfqc


Our products can remove Rootkit.Agent.dfqc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfqc Details


  • Category Rootkit
  • Discovered 5/7/2013 2:23:24 PM
  • Modified 7/31/2023 5:23:54 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f236c36ca0a2a884f512b0c3213199373856ba28feea8296919babb5915a92fb.sys 110592 1.0.0.554e5df002e1e37dabd525f651d2f3cb56 
8a449ce0a3d2ed069ed99ca1d60ab48fe52d388e0b9efd3334e4e81290783323.sys 110592 1.0.0.533a5b6dc9d5d164c5d0928f7f34a7242c 
6ee031aa865941c6bf922c1da37bad2c.sys 110592 1.0.0.556ee031aa865941c6bf922c1da37bad2c 
42a2d039b9adacae5edac7f5f35a1927.sys 110592 1.0.0.5542a2d039b9adacae5edac7f5f35a1927 
9d2ef45f50f4e7dc63bb5b420fa40dca.sys 32768beep6.1.7600.163859d2ef45f50f4e7dc63bb5b420fa40dca 
2a683112b5f858a9c9f8b478a98ea3d9.sys 110592 1.0.0.532a683112b5f858a9c9f8b478a98ea3d9 
78bcbb63d276aafad92b0ec81bb92496.sys 110592 1.0.0.5378bcbb63d276aafad92b0ec81bb92496 
85cf4d42e6cf1c168360991d96b02ac2.sys 111616 1.0.0.1985cf4d42e6cf1c168360991d96b02ac2 
de710c263719abd3c89bd0c79df3e987.sys 110592 1.0.0.53de710c263719abd3c89bd0c79df3e987 
037cea647199b8d787ca0f4c23b96ee7.sys 110592 1.0.0.55037cea647199b8d787ca0f4c23b96ee7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware