Home / Spyware Encyclopedia / Rootkit.Agent.dgce << Back

Recommendation to Automatically remove Rootkit.Agent.dgce


Our products can remove Rootkit.Agent.dgce and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgce Details


  • Category Rootkit
  • Discovered 8/9/2013 12:30:59 PM
  • Modified 7/24/2023 3:08:18 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3f239d68f2ed10bc667711ac50cd1da2.sys 13600  3f239d68f2ed10bc667711ac50cd1da2 
b915c496346be36c4ac0914b6b481a5f.sys 13600  b915c496346be36c4ac0914b6b481a5f 
2d3e3596192e5c1fafe30935ed27011d3a24c1d6bdf287b9d15fd22ca0b84d22.sys 13600  f2754f4e5e00e1bdf65959cb35c891ed 
f29f618c8bafb902c857c533d49f81404f4749794b5e284d086c2270fdc35d00.sys 13600  8381abcf85ba09e287ba68d267cae884 
1eaab3472ab58528a5a32479df0ae1a44c49eb779c0a83234a3fa1ec33a6931b.sys 13600  d285f5d15b10a45ec23e19b00da661af 
4469df5e41fd527f4c8d69ed8b1e3ea6.sys 13600  4469df5e41fd527f4c8d69ed8b1e3ea6 
81447c574dbdcf18b2be9b948801dd2d9211d446d3496acb9242cdee15331671.sys 13600  caee3e5e4397a2df41b5b1cf2dc55377 
8f1818aa692ed1152853c7783e8694c0.vir.sys 13600  8f1818aa692ed1152853c7783e8694c0 
17081a526ce8bf8981416921e5b748ba.vir.sys 13600  17081a526ce8bf8981416921e5b748ba 
3fadb51d091e2b74674ce755c078167c.vir.sys 13600  3fadb51d091e2b74674ce755c078167c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware