Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c1d709ceb610d2c1fa881a40d189b070.exe 81920  c1d709ceb610d2c1fa881a40d189b070 
84540615d8b59c1d952c9e1a37d8c37a.exe 81920  84540615d8b59c1d952c9e1a37d8c37a 
d8a01a87614a0d0611d3df65754c4dfeec5e03e565836f6e10e5f81b08f1352d.exe 81920  98d8e3d4254926ba5419b28e42c9447a 
a1cd460a49ce15473a6774112c4a68ad44c9679c.bin.exe 178688  07aeef056ad8467b8b3028d414f4fa80 
8656944c98481d4964069ad7dd593e9c478caf5ecf0407db3a58daaf8b0e7a93.exe 178688  f911c143a0b8661f8ead1c73c95cdc3b 
d46d2f708a8d6f24e7df2b8de115f72aabaf11d6.bin.exe 106496  b140d9d2606542dad4f71ec8d819e34f 
4a3326c8d30346f647792c1485516a4e.exe 107008  4a3326c8d30346f647792c1485516a4e 
c57d38b889a6c4ce67e0032c656b8990926e12c31fcbfa9fbe7ae274275612e3.exe 178688  fea17debbaf6813510447e83ad7b85ea 
e9fd96194a69063cdd001ab17f2b0f8b59bdffd76afe813e8ca9a406c5cd86c8.exe 88064  45f7335a336e7804665839394eb99ed0 
e6406d597d5051c89de22e7db4b84a15d2f9d517.bin.exe 86528  74d4a8226f244613a24d8651eb9edcf5 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware