Home / Spyware Encyclopedia / Rootkit.Agent.dgma << Back

Recommendation to Automatically remove Rootkit.Agent.dgma


Our products can remove Rootkit.Agent.dgma and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgma Details


  • Category Rootkit
  • Discovered 1/17/2013 1:53:59 PM
  • Modified 5/25/2015 11:17:07 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2d817da8f22273b2616f6394106cd1ec.sys 54740  2d817da8f22273b2616f6394106cd1ec 
79c919b5109b99dfc59ed23084891fc9.vir.sys 58181  79c919b5109b99dfc59ed23084891fc9 
09c205e22eea61858c220c5a8367023d.vir.sys 8448  09c205e22eea61858c220c5a8367023d 
727ce2e60fef7e5584dfa06ac6db1389.vir.sys 8448  727ce2e60fef7e5584dfa06ac6db1389 
7fd86be3851465c38fcd85aa4e41068b.vir.sys 8378  7fd86be3851465c38fcd85aa4e41068b 
984c57fbae2bb8f4b53bf15b20947e1c.vir.sys 90949  984c57fbae2bb8f4b53bf15b20947e1c 
0e98e4240e1fa84f16bc6c4a933b33f2.vir.sys 32768  0e98e4240e1fa84f16bc6c4a933b33f2 
cafc2ca33947797e68e0d98dfa3bf776.vir.sys 32768  cafc2ca33947797e68e0d98dfa3bf776 
72f84c83340a4749af9088f3ceed3db8.vir.exe 374641Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 072f84c83340a4749af9088f3ceed3db8 
c19df5c0c871ea6380cbed254a7b653a.vir.exe 281969Shenzhen QVOD Technology Co.,Ltd3, 0, 0, 0c19df5c0c871ea6380cbed254a7b653a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware