Home / Spyware Encyclopedia / Rootkit.Agent.dgpc << Back

Recommendation to Automatically remove Rootkit.Agent.dgpc


Our products can remove Rootkit.Agent.dgpc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgpc Details


  • Category Rootkit
  • Discovered 5/13/2013 9:13:55 PM
  • Modified 7/31/2023 5:22:53 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d9b77d3ce86833933575ce0e101bd0fb.exe 602112  d9b77d3ce86833933575ce0e101bd0fb 
2d6bc7309f7ff1c09ad542f2fb5e5e59.vir.exe 573440  2d6bc7309f7ff1c09ad542f2fb5e5e59 
1e08ac79b261a50e9ec33c8324d5a8b1.vir.exe 32768  1e08ac79b261a50e9ec33c8324d5a8b1 
ee3a367f241943cd06a6e59b1e4b9fcd.vir.exe 573440  ee3a367f241943cd06a6e59b1e4b9fcd 
b9d27a5c3c0cb658acf92629f862a3db.vir.exe 585728  b9d27a5c3c0cb658acf92629f862a3db 
2c507cdbaacb144b6431e287bae171d2.vir.exe 630784  2c507cdbaacb144b6431e287bae171d2 
f0eadf2f56aebabe87f3e2be51a0d2ac.vir.exe 618496  f0eadf2f56aebabe87f3e2be51a0d2ac 
6964e4598e723105ce66a5b080f655a1.vir.exe 540672  6964e4598e723105ce66a5b080f655a1 
02aa0c66066cbc3a394c83c0a4b6459b.vir.exe 585728  02aa0c66066cbc3a394c83c0a4b6459b 
2a7aa108f8db849148ae36a93e4ae939.vir.exe 610304  2a7aa108f8db849148ae36a93e4ae939 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware