Home / Spyware Encyclopedia / Rootkit.Agent.dgdp << Back

Recommendation to Automatically remove Rootkit.Agent.dgdp


Our products can remove Rootkit.Agent.dgdp and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgdp Details


  • Category Rootkit
  • Discovered 5/20/2013 1:10:02 PM
  • Modified 2/27/2024 11:05:39 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
160614027508a33abda8c8bd96dc744f265a0ea973019d778a4f0845b27013517e0d3ed6ef573871aa883a00ac0ae.exe 548864  af76e719b436e090672d10c32edd07a6 
12471901250fd049972ffb93f09fb5b0ed3a970464e9cce1000546b5f766c5ce823a0795181519b2b74f0cee580e8.exe 524288  68fe399ecef1bce1ebe617fe3f24885a 
4cc57254164a17459505452e7890f7c3.exe 806912  4cc57254164a17459505452e7890f7c3 
869b3740426853c8035100f463c3f446.exe 536576  869b3740426853c8035100f463c3f446 
652a560dfab27e8315d2da2de1cebd4f.exe 659456  652a560dfab27e8315d2da2de1cebd4f 
a6ebc921a2673829c3340f84ad9262da.exe 618496  a6ebc921a2673829c3340f84ad9262da 
e720a4fa655ac95e065db35d2bc7d4eec175d8587495087efaaf89fe7b52201a.exe 32768  c582abb45641147b8327333d6ba3b93e 
aa9a1b2d083285ef40a6187430a026d13cd88b11b85c150587057e54552ad069.exe 32768  9aa7fe34fa58634b46bb1c4890836b49 
e904467bd421acca6ca2fe9072450b59.exe 32768  e904467bd421acca6ca2fe9072450b59 
12c3d5cd8011e2feebd40213b439cb60.vir.exe 569344  12c3d5cd8011e2feebd40213b439cb60 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware