Home / Spyware Encyclopedia / Rootkit.Agent.dgio << Back

Recommendation to Automatically remove Rootkit.Agent.dgio


Our products can remove Rootkit.Agent.dgio and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgio Details


  • Category Rootkit
  • Discovered 10/24/2013 4:02:14 PM
  • Modified 8/8/2019 2:23:27 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4a84e6ee80754cf98fa4285a8deb7277.dll 54279Microsoft Corporation5.1.2600.2180 (xpsp4a84e6ee80754cf98fa4285a8deb7277 
219058a1ea6f9c4577ca8e2e90b16cd0.vir.sys 6536  219058a1ea6f9c4577ca8e2e90b16cd0 
f48044c4f1eacb91e6f3ae45e06adfb0.vir.sys 6536  f48044c4f1eacb91e6f3ae45e06adfb020/07/2023
1797bbfbf616053c656110cb23804499.vir.sys 6536  1797bbfbf616053c656110cb23804499 
03bd7fadb5b04ab89d3d4e1fd77b0edf.vir.sys 6536  03bd7fadb5b04ab89d3d4e1fd77b0edf 
7f7a348f621e2cd33be5e824873eea34.vir.sys 6536  7f7a348f621e2cd33be5e824873eea34 
745c377928ff27aab8c21967a939ac4e.vir.sys 6536  745c377928ff27aab8c21967a939ac4e 
526150ceb1c4b17483293c4304c7a538.vir.sys 6536  526150ceb1c4b17483293c4304c7a538 
1129268e155502e1d74b3c2e22bb17ce.vir.sys 6536  1129268e155502e1d74b3c2e22bb17ce 
7f63beea0ee0a7e1b2dd0f3e04f12185.vir.sys 6536  7f63beea0ee0a7e1b2dd0f3e04f12185 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware