Home / Spyware Encyclopedia / Rootkit.Agent.dgdk << Back

Recommendation to Automatically remove Rootkit.Agent.dgdk


Our products can remove Rootkit.Agent.dgdk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgdk Details


  • Category Rootkit
  • Discovered 3/15/2014 9:40:47 PM
  • Modified 7/31/2023 5:23:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
44eb648965da1c48054a0f3a2d8e28c73276b5f082a31d0a6033134349301d0f.sys 16384  1be2ef9aabfe8dcb42709ee571873046 
4ef6bb86af6821f4ccb41b788690228c.vir.sys 8192  4ef6bb86af6821f4ccb41b788690228c 
dfa5dfa3783a6eb655d6c834d977e1e9.vir.sys 32768  dfa5dfa3783a6eb655d6c834d977e1e9 
17160000153a2d0bedd68b87a79ce3edf22aa3919f18631ced8bfff296c8181fa6d30143256c257a834232b5b3e78.sys 32768  d0216580b48725fd727ceb6bd38e63b5 
171558060940f20e640f754d197df95e18a3a05a0dce4315808dc8607abc4a3ff958d09ca7baea5c9d12c06914505.sys 32768  943db1ef7ebbe9e0cb1254591951789d 
19012009843dd87425053fc8a45aa3c2bfe78c8804701e537369cbd2d900da07749a613750327f2681fa3ee96c96e.sys 32768  9cbbb522dfb3aed726b96bb08773b60d 
22f458a9c1f3880a864eceb00ee6ebde.vir.sys 32768  22f458a9c1f3880a864eceb00ee6ebde 
6638eedb7be85f38d565dfc6bcc96f4c.vir.sys 32768  6638eedb7be85f38d565dfc6bcc96f4c 
38bbaab91cc8c2103ad2528b83924238.vir.sys 8192  38bbaab91cc8c2103ad2528b83924238 
a61a38cf5b9bf586b2ad0ce6a46c440b.vir.sys 8192  a61a38cf5b9bf586b2ad0ce6a46c440b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware