Home / Spyware Encyclopedia / Rootkit.Agent.dfzr << Back

Recommendation to Automatically remove Rootkit.Agent.dfzr


Our products can remove Rootkit.Agent.dfzr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfzr Details


  • Category Rootkit
  • Discovered 9/12/2014 9:51:00 PM
  • Modified 8/2/2024 11:50:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9b16438c97f0fec4d7ffda1ffa7f32ebd4d0f48c.bin.sys 16384  9b36dff17940025883a4c08700c3e11e 
0d32802190e2feafe249308ba22e1ecf.sys 32768  0d32802190e2feafe249308ba22e1ecf 
53efdb8cdbd539406e1d98f76f81fdda.sys 8192  53efdb8cdbd539406e1d98f76f81fdda 
356a48690a09acc2ff21d980caa8fe0e732c516bf6da5f3226a3f1159e858cf8.sys 8192  b85305c20acd5ca96422f73df15b8332 
9a6ebf7b08653b4383e14646b3bd0890.vir.sys 32768  9a6ebf7b08653b4383e14646b3bd0890 
920d7c3fd6d5408b42d4b98393414928.vir.sys 32768  920d7c3fd6d5408b42d4b98393414928 
e85fef12b19aa9fe7390865ca035f769.vir.sys 32768  e85fef12b19aa9fe7390865ca035f769 
1715560812064f0a31e453a26d7b58d2fc026c7fc94c0bbf53c37ccb61ffb61332db55648e934c7f42c624fa02a94.sys 32768  8e0994bd482c62e28c5a0e325dae1e3b 
b10be4bbd095c34d0ebe6ed1e8fdbb56.vir.sys 32768  b10be4bbd095c34d0ebe6ed1e8fdbb56 
9936bf5307d39d33fc0d9d9b1790b16c.vir.sys 32768  9936bf5307d39d33fc0d9d9b1790b16c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware