Home / Spyware Encyclopedia / Rootkit.Agent.dgex << Back

Recommendation to Automatically remove Rootkit.Agent.dgex


Our products can remove Rootkit.Agent.dgex and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgex Details


  • Category Rootkit
  • Discovered 7/2/2013 12:33:37 AM
  • Modified 12/15/2020 12:10:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
35cce6621c6a24eb1f1d1c3bff3a3faf.sys 32768  35cce6621c6a24eb1f1d1c3bff3a3faf 
171122040624d323eb8e541f111a336556f6593dbded7899cbdfaed7b458a71396b9c6edf3dea3ff626364702b5c3.sys 16384  fb5a034ca0cac3268e4fcc7e1e64af5f 
b4d660ac81758f79be282fe3a767d87b.vir.sys 32768  b4d660ac81758f79be282fe3a767d87b 
0e2bc062a43bd464222ee48964277b2c.vir.sys 16384  0e2bc062a43bd464222ee48964277b2c 
79e31434ccc546ed10a35517cce03456.vir.sys 32768  79e31434ccc546ed10a35517cce03456 
683c6641b0d05c9e581daf6084cf0f4d.vir.sys 16384  683c6641b0d05c9e581daf6084cf0f4d 
0dc0a314a5ed4ffc25d2e1b34c2ecbda.vir.sys 32768  0dc0a314a5ed4ffc25d2e1b34c2ecbda 
138f2825f259cf1585113e56ca5de0e3.vir.sys 32768  138f2825f259cf1585113e56ca5de0e3 
bc28fff621cca55a2697ebe64233adc4.sys 32768  bc28fff621cca55a2697ebe64233adc415/12/2020
050aef0796e9405c23feeb10edd49cc3.vir.sys 32768  050aef0796e9405c23feeb10edd49cc3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware