Home / Spyware Encyclopedia / Rootkit.Agent.dgbs << Back

Recommendation to Automatically remove Rootkit.Agent.dgbs


Our products can remove Rootkit.Agent.dgbs and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgbs Details


  • Category Rootkit
  • Discovered 7/9/2014 11:08:54 PM
  • Modified 7/24/2024 7:39:07 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e29dafa1c7e7b9bc809d4adbe5208779.sys 16384  e29dafa1c7e7b9bc809d4adbe5208779 
e2edbe2cf7251c50f175b6993b5a2d3e.sys 16384  e2edbe2cf7251c50f175b6993b5a2d3e 
04ea25da393650d0a52e4b6cb7262ff8f6110b26.bin.sys 8192  57788fed7b8c72f49dc5b2b3e3f95be6 
9f146a92fd6818d54076be7fa674e6cd.sys 8192  9f146a92fd6818d54076be7fa674e6cd 
5098a7e8d4052e19a63914464c409fbe6d1a7da6e3a58be865cdca82e1090f0f.sys 16384  ffa529fbe727a87b6045e7220f7217f6 
73d044b143d82dcb634f169bdfe04fbeaabfba5d7cc221e8805a2d8c3481b4b3.sys 8192  391c63353b8e741559514e071a6a2aba 
53440788bbeb4facc478e6bd3172dfe256f86acb125d315dd1927d5c04edf57a.sys 16384  6d7f398ebeebd105d048a1eb6468add6 
5ad7b03a25b608b033cd98de31f5dc42.sys 16384  5ad7b03a25b608b033cd98de31f5dc42 
58d22e9059c3a9fd037d37414059ebfc.sys 16384  58d22e9059c3a9fd037d37414059ebfc 
5c8b8255446ab20ecd8e3a0ed0fabddc.sys 8192  5c8b8255446ab20ecd8e3a0ed0fabddc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware