Home / Spyware Encyclopedia / Rootkit.Agent.dgcj << Back

Recommendation to Automatically remove Rootkit.Agent.dgcj


Our products can remove Rootkit.Agent.dgcj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgcj Details


  • Category Rootkit
  • Discovered 10/31/2012 2:13:29 AM
  • Modified 12/11/2014 5:47:58 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ca8be97185f8fc4bc1d0695b8112d92ea298457d46c13c1f1eb3665960919bd8.exe 32768  2eb9070dd0ffa56620a1f73c6ce0c3a3 
3c26654aace809027bd3a69fbc0fe11a.dll.exe 16384  3c26654aace809027bd3a69fbc0fe11a 
a700abd44c6d4cc5f41f9fd97e2427a1.sys 12432  a700abd44c6d4cc5f41f9fd97e2427a1 
25d737e725d176272fbee94fdca3c22af5e1a14ee48ece2713c075d352cacce1.exe 12432  7db09c475d865f1013ffdc830c1aebfd 
6f7d16d2d1ad1fd54a566195fe2fc1f4.vir.sys 12432  6f7d16d2d1ad1fd54a566195fe2fc1f4 
04a6e6e550cb94a18ba0247d4f858529.vir.exe 12432  04a6e6e550cb94a18ba0247d4f858529 
1a2789a66e53fdb7cf1657f187bb79c3.vir.sys 16384  1a2789a66e53fdb7cf1657f187bb79c3 
580dfac629d706f3d19934ac46dce104.vir.sys 12432  580dfac629d706f3d19934ac46dce104 
5d0fc8abe002ffde9e52580637891f9c.vir.sys 12432  5d0fc8abe002ffde9e52580637891f9c 
8ee9ac8b3dbf7cdfc49f188d5535e547.vir.sys 12432  8ee9ac8b3dbf7cdfc49f188d5535e547 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware