Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
dfhkmor.exe 84480  22e4a6baffc4bf6c12b2b30b1ab37e0d 
84540615d8b59c1d952c9e1a37d8c37a.exe 81920  84540615d8b59c1d952c9e1a37d8c37a 
4e8721375b437b15176c2964458e30cc.exe 270848  4e8721375b437b15176c2964458e30cc 
73a3cd32a762f3c8d5ee1166c91a011c8ee8a6dad71f5dc9022aba8a17926900.exe 87552  067ab70f60aa381e76f5e3b26510cf47 
2b198cc84ce36906a9ba6db02fca7695.exe 81920  2b198cc84ce36906a9ba6db02fca7695 
2ece23415a8205b0ca330503d9f0306bcc77074ee275277e4ef5900ebae3efb1.exe 81920  86db9496e40088febba982bf16dfac05 
4314424a49d2660c864a8d8c6c6ddbd7e30edd20.bin.exe 87552  0c61b90d078d58e8d5eb5075f744da10 
8656944c98481d4964069ad7dd593e9c478caf5ecf0407db3a58daaf8b0e7a93.exe 178688  f911c143a0b8661f8ead1c73c95cdc3b 
a9833e6d33456c0daa8601c8f3be6c74b17aee63.bin.exe 178688  81e25ee30e8a28b0f6231d7c4422107f 
a25b28d88ad125f4f802b5739aac8be40e2355dfc9399e8bbba3dac7317e94f1.exe 87552  b126c51f38c98bf3fc883310b9c8e63b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware