Home / Spyware Encyclopedia / Rootkit.Agent.dgex << Back

Recommendation to Automatically remove Rootkit.Agent.dgex


Our products can remove Rootkit.Agent.dgex and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgex Details


  • Category Rootkit
  • Discovered 7/2/2013 12:33:37 AM
  • Modified 12/15/2020 12:10:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
171122040624d323eb8e541f111a336556f6593dbded7899cbdfaed7b458a71396b9c6edf3dea3ff626364702b5c3.sys 16384  fb5a034ca0cac3268e4fcc7e1e64af5f 
9480d51eb562591b4b192bd21a7db106.vir.sys 16384  9480d51eb562591b4b192bd21a7db106 
e6f3482d974cbe2fc4c42d8ac8df0dbb.vir.sys 16384  e6f3482d974cbe2fc4c42d8ac8df0dbb 
bc28fff621cca55a2697ebe64233adc4.sys 32768  bc28fff621cca55a2697ebe64233adc4 
2bdf56143e11d7a97266f339abdadf75.vir.sys 16384  2bdf56143e11d7a97266f339abdadf75 
bc28fff621cca55a2697ebe64233adc4.sys 32768  bc28fff621cca55a2697ebe64233adc415/12/2020
050aef0796e9405c23feeb10edd49cc3.vir.sys 32768  050aef0796e9405c23feeb10edd49cc3 
0dc0a314a5ed4ffc25d2e1b34c2ecbda.vir.sys 32768  0dc0a314a5ed4ffc25d2e1b34c2ecbda 
19105b4ad913a6d03252717913b5f5cc.vir.sys 32768  19105b4ad913a6d03252717913b5f5cc 
79e31434ccc546ed10a35517cce03456.vir.sys 32768  79e31434ccc546ed10a35517cce03456 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware