Home / Spyware Encyclopedia / Rootkit.Agent.dfzr << Back

Recommendation to Automatically remove Rootkit.Agent.dfzr


Our products can remove Rootkit.Agent.dfzr and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfzr Details


  • Category Rootkit
  • Discovered 9/12/2014 9:51:00 PM
  • Modified 8/2/2024 11:50:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
53efdb8cdbd539406e1d98f76f81fdda.sys 8192  53efdb8cdbd539406e1d98f76f81fdda 
333c8404c89da4b4ebdc599c5bd1d60844325f14612e8b81cd60fda0e06ae2df.sys 8192  309fb56f76d8133e228362e61bb38a35 
63b6827890b24fb1c39cba81573d7bba.vir.sys 32768  63b6827890b24fb1c39cba81573d7bba 
915e035cf568c6b87001b514b75b8747.vir.sys 32768  915e035cf568c6b87001b514b75b8747 
529181fb000af3191781abeb3b08ef1a.vir.sys 32768  529181fb000af3191781abeb3b08ef1a 
2adabba0fe85b0941944869f1c71d02a.vir.sys 32768  2adabba0fe85b0941944869f1c71d02a 
b2b116fc8e12f304b7c88be3d7cd52e0.vir.sys 32768  b2b116fc8e12f304b7c88be3d7cd52e0 
12e17938d161b48793b6de790d13e088.vir.sys 32768  12e17938d161b48793b6de790d13e088 
e85fef12b19aa9fe7390865ca035f769.vir.sys 32768  e85fef12b19aa9fe7390865ca035f769 
431b1e0010b635e5e544fd601d6560e8.vir.sys 32768  431b1e0010b635e5e544fd601d6560e8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware