Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
684915dd356ce0909125952c37ac6ec8.exe 81408  684915dd356ce0909125952c37ac6ec8 
4e1363a2ea812e99d35c7eb1cbcaa5434f529f1218ba745c79ca236db3fdb835697326320d9843f978a3276c6a8150b6bc1.exe 81920  7beba6d4608ee070d2ff36782cc9837f 
0dbd08fe39fda3816b0e820f28b7a24151ec32ec.bin.exe 83968  c7b55b729780ee5f26c0630481d52288 
qqttvvx.exe 81920  5df1dc2106e8cae806c2ccff5e6c8ac2 
53c3607c6de33dc46d08a9714b532cf49b68f6ca.bin.exe 85504  60244e8f40e151823c89f521e5c07279 
802931a88cc913a43cea7495fa13ebce.exe 83968  802931a88cc913a43cea7495fa13ebce 
d432502e301458a4f8461508566e5a75c47d50c6.bin.exe 270848  d73a0ca36c69275c411499239c6b98bf 
bjrrziy.exe 85504  535fcc3313187d1469acfe112bc81d8b 
dfhkmor.exe 84480  22e4a6baffc4bf6c12b2b30b1ab37e0d 
f664ba6673980bebc89bc918ff423e39daa8f99539e260370a63e7b6435f9f89.exe 83968  e3231460c6c42948ff64a213a38244b4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware