Home / Spyware Encyclopedia / Rootkit.Agent.dgbx << Back

Recommendation to Automatically remove Rootkit.Agent.dgbx


Our products can remove Rootkit.Agent.dgbx and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgbx Details


  • Category Rootkit
  • Discovered 6/18/2014 1:26:26 PM
  • Modified 7/29/2023 3:39:10 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bf994917cd5955e22e789d49662a80b4.sys 19044Microsoft Corporation6.1.7600.16385bf994917cd5955e22e789d49662a80b4 
2e3e09343e274971042c366da8b8af12052207f0c29b850d34b51eaa4e533cba.sys 2238  a6d334c0559f56ebd6db7b07361d21e1 
a9ee5b038b11ab4131e517b4ce00d172.vir.exe 613888 3.2.101021a9ee5b038b11ab4131e517b4ce00d172 
17590005007d305118e7617b396ad38445f2a56398597686cedcb71f40038afff66c5d63f0bc125ef698cc89ec103.sys 6656  54243bc5be87c6bc8e170fc5831e813e 
c0eecba1e56c64964b77b80b4736b649.vir.sys 6656  c0eecba1e56c64964b77b80b4736b649 
27e061a045a4ac31b9a8b0b6f8766f92.vir.sys 6656  27e061a045a4ac31b9a8b0b6f8766f92 
22dc1e546085d12ba0345a13ba75d230.vir.sys 6656  22dc1e546085d12ba0345a13ba75d230 
0ea9f0c25f4bf05bd7c2925f5334e453.vir.sys 6656  0ea9f0c25f4bf05bd7c2925f5334e453 
1996967b1c096365d9e6f8ae5b440977.vir.sys 6656  1996967b1c096365d9e6f8ae5b440977 
22dc1e546085d12ba0345a13ba75d230.vir.sys 6656  22dc1e546085d12ba0345a13ba75d23029/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware