Home / Spyware Encyclopedia / Rootkit.Agent.dgex << Back

Recommendation to Automatically remove Rootkit.Agent.dgex


Our products can remove Rootkit.Agent.dgex and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgex Details


  • Category Rootkit
  • Discovered 7/2/2013 12:33:37 AM
  • Modified 12/15/2020 12:10:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
171122040624d323eb8e541f111a336556f6593dbded7899cbdfaed7b458a71396b9c6edf3dea3ff626364702b5c3.sys 16384  fb5a034ca0cac3268e4fcc7e1e64af5f 
9480d51eb562591b4b192bd21a7db106.vir.sys 16384  9480d51eb562591b4b192bd21a7db106 
bc28fff621cca55a2697ebe64233adc4.sys 32768  bc28fff621cca55a2697ebe64233adc4 
17442505717dd1261e8f6aa98c086ef04d5297c0bbc87ea3b06c460e2dde0ec0242abcda9b5a8633adecb8fe07ac9.sys 32768  d963a2db9ddb98be6a01f12c3cf372f5 
b4d660ac81758f79be282fe3a767d87b.vir.sys 32768  b4d660ac81758f79be282fe3a767d87b 
0e2bc062a43bd464222ee48964277b2c.vir.sys 16384  0e2bc062a43bd464222ee48964277b2c 
79e31434ccc546ed10a35517cce03456.vir.sys 32768  79e31434ccc546ed10a35517cce03456 
683c6641b0d05c9e581daf6084cf0f4d.vir.sys 16384  683c6641b0d05c9e581daf6084cf0f4d 
0dc0a314a5ed4ffc25d2e1b34c2ecbda.vir.sys 32768  0dc0a314a5ed4ffc25d2e1b34c2ecbda 
138f2825f259cf1585113e56ca5de0e3.vir.sys 32768  138f2825f259cf1585113e56ca5de0e3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware