Home / Spyware Encyclopedia / Rootkit.Agent.dgcj << Back

Recommendation to Automatically remove Rootkit.Agent.dgcj


Our products can remove Rootkit.Agent.dgcj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgcj Details


  • Category Rootkit
  • Discovered 10/31/2012 2:13:29 AM
  • Modified 12/11/2014 5:47:58 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ca8be97185f8fc4bc1d0695b8112d92ea298457d46c13c1f1eb3665960919bd8.exe 32768  2eb9070dd0ffa56620a1f73c6ce0c3a3 
3c26654aace809027bd3a69fbc0fe11a.dll.exe 16384  3c26654aace809027bd3a69fbc0fe11a 
6f7d16d2d1ad1fd54a566195fe2fc1f4.vir.sys 12432  6f7d16d2d1ad1fd54a566195fe2fc1f4 
1716020656368d022c801378ed173fad413044dc145d257c7ee018d63a24e96d0fdd63f72e83b38748341da34a6b2.exe 12432  f1ca558707222f590806675ac2c62835 
dcf8a99fdcae58e60c3b4cb3dd8a2890.vir.sys 12432  dcf8a99fdcae58e60c3b4cb3dd8a2890 
b258baf7b69a9d85d127f77dfea4d1dd.vir.exe 12432  b258baf7b69a9d85d127f77dfea4d1dd 
04a6e6e550cb94a18ba0247d4f858529.vir.exe 12432  04a6e6e550cb94a18ba0247d4f858529 
580dfac629d706f3d19934ac46dce104.vir.sys 12432  580dfac629d706f3d19934ac46dce104 
25d737e725d176272fbee94fdca3c22af5e1a14ee48ece2713c075d352cacce1.exe 12432  7db09c475d865f1013ffdc830c1aebfd 
a700abd44c6d4cc5f41f9fd97e2427a1.sys 12432  a700abd44c6d4cc5f41f9fd97e2427a1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware