Home / Spyware Encyclopedia / Rootkit.Agent.dgex << Back

Recommendation to Automatically remove Rootkit.Agent.dgex


Our products can remove Rootkit.Agent.dgex and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgex Details


  • Category Rootkit
  • Discovered 7/2/2013 12:33:37 AM
  • Modified 12/15/2020 12:10:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
35cce6621c6a24eb1f1d1c3bff3a3faf.sys 32768  35cce6621c6a24eb1f1d1c3bff3a3faf 
171122040624d323eb8e541f111a336556f6593dbded7899cbdfaed7b458a71396b9c6edf3dea3ff626364702b5c3.sys 16384  fb5a034ca0cac3268e4fcc7e1e64af5f 
9480d51eb562591b4b192bd21a7db106.vir.sys 16384  9480d51eb562591b4b192bd21a7db106 
e6f3482d974cbe2fc4c42d8ac8df0dbb.vir.sys 16384  e6f3482d974cbe2fc4c42d8ac8df0dbb 
bc28fff621cca55a2697ebe64233adc4.sys 32768  bc28fff621cca55a2697ebe64233adc4 
17442505717dd1261e8f6aa98c086ef04d5297c0bbc87ea3b06c460e2dde0ec0242abcda9b5a8633adecb8fe07ac9.sys 32768  d963a2db9ddb98be6a01f12c3cf372f5 
2bdf56143e11d7a97266f339abdadf75.vir.sys 16384  2bdf56143e11d7a97266f339abdadf75 
683c6641b0d05c9e581daf6084cf0f4d.vir.sys 16384  683c6641b0d05c9e581daf6084cf0f4d 
0e2bc062a43bd464222ee48964277b2c.vir.sys 16384  0e2bc062a43bd464222ee48964277b2c 
b4d660ac81758f79be282fe3a767d87b.vir.sys 32768  b4d660ac81758f79be282fe3a767d87b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware