Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0dbd08fe39fda3816b0e820f28b7a24151ec32ec.bin.exe 83968  c7b55b729780ee5f26c0630481d52288 
684915dd356ce0909125952c37ac6ec8.exe 81408  684915dd356ce0909125952c37ac6ec8 
qqttvvx.exe 81920  5df1dc2106e8cae806c2ccff5e6c8ac2 
bjrrziy.exe 85504  535fcc3313187d1469acfe112bc81d8b 
f664ba6673980bebc89bc918ff423e39daa8f99539e260370a63e7b6435f9f89.exe 83968  e3231460c6c42948ff64a213a38244b4 
e47ba5f59eb23654f60e2d9562f5a721.exe 81920  e47ba5f59eb23654f60e2d9562f5a721 
c1d709ceb610d2c1fa881a40d189b070.exe 81920  c1d709ceb610d2c1fa881a40d189b070 
84540615d8b59c1d952c9e1a37d8c37a.exe 81920  84540615d8b59c1d952c9e1a37d8c37a 
d8a01a87614a0d0611d3df65754c4dfeec5e03e565836f6e10e5f81b08f1352d.exe 81920  98d8e3d4254926ba5419b28e42c9447a 
2ece23415a8205b0ca330503d9f0306bcc77074ee275277e4ef5900ebae3efb1.exe 81920  86db9496e40088febba982bf16dfac05 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware