Home / Spyware Encyclopedia / Rootkit.Agent.dgcj << Back

Recommendation to Automatically remove Rootkit.Agent.dgcj


Our products can remove Rootkit.Agent.dgcj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.dgcj Details


  • Category Rootkit
  • Discovered 10/31/2012 2:13:29 AM
  • Modified 12/11/2014 5:47:58 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3c26654aace809027bd3a69fbc0fe11a.dll.exe 16384  3c26654aace809027bd3a69fbc0fe11a 
a700abd44c6d4cc5f41f9fd97e2427a1.sys 12432  a700abd44c6d4cc5f41f9fd97e2427a1 
1716020656368d022c801378ed173fad413044dc145d257c7ee018d63a24e96d0fdd63f72e83b38748341da34a6b2.exe 12432  f1ca558707222f590806675ac2c62835 
b258baf7b69a9d85d127f77dfea4d1dd.vir.exe 12432  b258baf7b69a9d85d127f77dfea4d1dd 
580dfac629d706f3d19934ac46dce104.vir.sys 12432  580dfac629d706f3d19934ac46dce104 
48e44bbac3bc67f1e86fe0316a2c9fd3.vir.exe 16384  48e44bbac3bc67f1e86fe0316a2c9fd3 
22efedcc63989b4a746956bd83a840a5.vir.exe 16384  22efedcc63989b4a746956bd83a840a5 
a768916c0564cc62464237e8a8b82f9e.vir.sys 12432  a768916c0564cc62464237e8a8b82f9e 
1a2789a66e53fdb7cf1657f187bb79c3.vir.sys 16384  1a2789a66e53fdb7cf1657f187bb79c3 
04a6e6e550cb94a18ba0247d4f858529.vir.exe 12432  04a6e6e550cb94a18ba0247d4f858529 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware