Home / Spyware Encyclopedia / Rootkit.Agent.dgfl << Back

Recommendation to Automatically remove Rootkit.Agent.dgfl


Our products can remove Rootkit.Agent.dgfl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgfl Details


  • Category Rootkit
  • Discovered 11/26/2012 2:00:51 PM
  • Modified 4/6/2023 4:10:36 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9f01ffbcef75ff9eecfb04b3acc4c4b4.vir.sys 13568  9f01ffbcef75ff9eecfb04b3acc4c4b4 
28f0965771a8d67a177cf07ec3890e8b.sys 13568  28f0965771a8d67a177cf07ec3890e8b06/04/2023
c5257bbaecaa53211115cbb6f868957c.vir.sys 13568  c5257bbaecaa53211115cbb6f868957c 
4ebb974490ed113e37659755b4d80486.vir.sys 13568  4ebb974490ed113e37659755b4d80486 
f07ade97866f37e696ade76ca41eb98a.vir.sys 13568  f07ade97866f37e696ade76ca41eb98a 
092d8a932c6632db78a5c278656b82a7.vir.sys 13568  092d8a932c6632db78a5c278656b82a7 
557f3e6025ba604947f3a8e4ec077565.vir.sys 13568  557f3e6025ba604947f3a8e4ec077565 
6188c86d433c7b5128f45c7fce1e3043.vir.sys 13568  6188c86d433c7b5128f45c7fce1e3043 
460ed59b65de9d3114b54da31aa55770.vir.sys 13568  460ed59b65de9d3114b54da31aa55770 
9e2d85315995c451bbffc1f09d24d972.vir.sys 13568  9e2d85315995c451bbffc1f09d24d972 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware