Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4e1363a2ea812e99d35c7eb1cbcaa5434f529f1218ba745c79ca236db3fdb835697326320d9843f978a3276c6a8150b6bc1.exe 81920  7beba6d4608ee070d2ff36782cc9837f 
684915dd356ce0909125952c37ac6ec8.exe 81408  684915dd356ce0909125952c37ac6ec8 
f664ba6673980bebc89bc918ff423e39daa8f99539e260370a63e7b6435f9f89.exe 83968  e3231460c6c42948ff64a213a38244b4 
e47ba5f59eb23654f60e2d9562f5a721.exe 81920  e47ba5f59eb23654f60e2d9562f5a721 
84540615d8b59c1d952c9e1a37d8c37a.exe 81920  84540615d8b59c1d952c9e1a37d8c37a 
d8a01a87614a0d0611d3df65754c4dfeec5e03e565836f6e10e5f81b08f1352d.exe 81920  98d8e3d4254926ba5419b28e42c9447a 
ssdt01.sys 17664  f1fdc51e4db595b235346260dceaadd1 
1db57e95c8b92c0b7f3f28ea6711d585194ed071.bin.exe 87552  c3006e3baac876d8e7739c7cf87cf9bc 
405a6bb64662a6d2551455d9062e85b53bf090e105b930b09fa748b2a0f52b3d.exe 87552  7c1d34b220c7c4925d61766615aae8ff 
445adc261264f1c004c1ade12e4774b3.exe 87552  445adc261264f1c004c1ade12e4774b3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware