Home / Spyware Encyclopedia / Rootkit.Agent.dgcj << Back

Recommendation to Automatically remove Rootkit.Agent.dgcj


Our products can remove Rootkit.Agent.dgcj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgcj Details


  • Category Rootkit
  • Discovered 10/31/2012 2:13:29 AM
  • Modified 12/11/2014 5:47:58 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ca8be97185f8fc4bc1d0695b8112d92ea298457d46c13c1f1eb3665960919bd8.exe 32768  2eb9070dd0ffa56620a1f73c6ce0c3a3 
3c26654aace809027bd3a69fbc0fe11a.dll.exe 16384  3c26654aace809027bd3a69fbc0fe11a 
a700abd44c6d4cc5f41f9fd97e2427a1.sys 12432  a700abd44c6d4cc5f41f9fd97e2427a1 
6f7d16d2d1ad1fd54a566195fe2fc1f4.vir.sys 12432  6f7d16d2d1ad1fd54a566195fe2fc1f4 
1716020656368d022c801378ed173fad413044dc145d257c7ee018d63a24e96d0fdd63f72e83b38748341da34a6b2.exe 12432  f1ca558707222f590806675ac2c62835 
b258baf7b69a9d85d127f77dfea4d1dd.vir.exe 12432  b258baf7b69a9d85d127f77dfea4d1dd 
04a6e6e550cb94a18ba0247d4f858529.vir.exe 12432  04a6e6e550cb94a18ba0247d4f858529 
1a2789a66e53fdb7cf1657f187bb79c3.vir.sys 16384  1a2789a66e53fdb7cf1657f187bb79c3 
580dfac629d706f3d19934ac46dce104.vir.sys 12432  580dfac629d706f3d19934ac46dce104 
680289546d8f2f59ac786cd291801967.vir.sys 16384  680289546d8f2f59ac786cd291801967 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware