Home / Spyware Encyclopedia / Rootkit.Agent.dgdk << Back

Recommendation to Automatically remove Rootkit.Agent.dgdk


Our products can remove Rootkit.Agent.dgdk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgdk Details


  • Category Rootkit
  • Discovered 3/15/2014 9:40:47 PM
  • Modified 7/31/2023 5:23:34 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
44eb648965da1c48054a0f3a2d8e28c73276b5f082a31d0a6033134349301d0f.sys 16384  1be2ef9aabfe8dcb42709ee571873046 
4ef6bb86af6821f4ccb41b788690228c.vir.sys 8192  4ef6bb86af6821f4ccb41b788690228c 
dfa5dfa3783a6eb655d6c834d977e1e9.vir.sys 32768  dfa5dfa3783a6eb655d6c834d977e1e9 
17160000153a2d0bedd68b87a79ce3edf22aa3919f18631ced8bfff296c8181fa6d30143256c257a834232b5b3e78.sys 32768  d0216580b48725fd727ceb6bd38e63b5 
38bbaab91cc8c2103ad2528b83924238.vir.sys 8192  38bbaab91cc8c2103ad2528b83924238 
a61a38cf5b9bf586b2ad0ce6a46c440b.vir.sys 8192  a61a38cf5b9bf586b2ad0ce6a46c440b 
fb7743039fe843b5a3b1699233d065ac.vir.sys 8192  fb7743039fe843b5a3b1699233d065ac 
8550f7d317074adf48e4d16a454173e9.vir.sys 16384  8550f7d317074adf48e4d16a454173e9 
45320f2ed80227ab70a40479be755f80.vir.sys 32768  45320f2ed80227ab70a40479be755f80 
0bc8b87776e958c42ddf8183055a2960.vir.sys 16384  0bc8b87776e958c42ddf8183055a2960 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware