Home / Spyware Encyclopedia / Rootkit.Agent.dgam << Back

Recommendation to Automatically remove Rootkit.Agent.dgam


Our products can remove Rootkit.Agent.dgam and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgam Details


  • Category Rootkit
  • Discovered 11/9/2012 5:26:03 AM
  • Modified 12/25/2013 11:08:06 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8e6d5cbc478e79733c1fc733952679d5.sys 13568  8e6d5cbc478e79733c1fc733952679d5 
764e1ef180dd33ba9e7b941229a20890.vir.sys 13568  764e1ef180dd33ba9e7b941229a20890 
fdc2f3c15e59ffc2da1532f28179bd05.vir.exe 196096  fdc2f3c15e59ffc2da1532f28179bd05 
925a751fdd71dcd06471ea2a0b8623e3.vir.sys 13568  925a751fdd71dcd06471ea2a0b8623e3 
14af86e496c7af04780f0ccdbbe7a473.vir.sys 13568  14af86e496c7af04780f0ccdbbe7a473 
89bfa3451ce6645fab1f162c01c990d6.vir.sys 13568  89bfa3451ce6645fab1f162c01c990d6 
e4d78e0afdad3acce8d7cdeeea4ced76.vir.sys 13568  e4d78e0afdad3acce8d7cdeeea4ced76 
2ce6e99516ff093d3291266ff8dabb99.vir.sys 13568  2ce6e99516ff093d3291266ff8dabb99 
c193c4aa2b0732cd5fa60a8206fc5231.sys 13568  c193c4aa2b0732cd5fa60a8206fc5231 
d7342d014ae3b3aa20dd4e90599c3309.sys 13568  d7342d014ae3b3aa20dd4e90599c3309 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware