Home / Spyware Encyclopedia / Rootkit.Agent.dfuj << Back

Recommendation to Automatically remove Rootkit.Agent.dfuj


Our products can remove Rootkit.Agent.dfuj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dfuj Details


  • Category Rootkit
  • Discovered 5/3/2024 8:04:47 PM
  • Modified 5/4/2024 11:01:39 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1a562162f63e3e5aa1bf4c8100d0888bd05a2bc6.bin.exe 576130  8dfdf992b0a6ee477a8a1dec25c47bcb 
2ade1a674ed121f81fd741e7b4587e5f.exe 1264779  2ade1a674ed121f81fd741e7b4587e5f 
6c286dd0ad6beda55f1052f5fc1981c09791aad374b1ba4d91427e07848b3aeb.exe 114176  99252a75cb0782f8564aa034f2371fb8 
36fff321be26ee9471712a6cf8216702.exe 369831  36fff321be26ee9471712a6cf8216702 
e77369e9eda687e4b39d5d4b84f7de84.exe 518338  e77369e9eda687e4b39d5d4b84f7de84 
3536842e99c7d68e9481a10f9a7f7d75e0d108bc7381f6a1e641ca466de0d422.exe 188928  afa3a5f3c822baaa5cedbede13d406bd 
0b5c932cad10aea368a8852e415658f0.exe 188928  0b5c932cad10aea368a8852e415658f0 
626a23e02716c6d2aefc14024484b489b0f6994a.bin.exe 188012  5303a0835c918fa72088dd3cc91252ab 
13cd728c0919017d0e3508b9ce472bf3.vir.exe 98304  13cd728c0919017d0e3508b9ce472bf3 
4598f2622cd91209936f3872a86a5803.vir.exe 743714  4598f2622cd91209936f3872a86a5803 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware