Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bjrrziy.exe 85504  535fcc3313187d1469acfe112bc81d8b 
c1d709ceb610d2c1fa881a40d189b070.exe 81920  c1d709ceb610d2c1fa881a40d189b070 
d8a01a87614a0d0611d3df65754c4dfeec5e03e565836f6e10e5f81b08f1352d.exe 81920  98d8e3d4254926ba5419b28e42c9447a 
4e8721375b437b15176c2964458e30cc.exe 270848  4e8721375b437b15176c2964458e30cc 
2b198cc84ce36906a9ba6db02fca7695.exe 81920  2b198cc84ce36906a9ba6db02fca7695 
2ece23415a8205b0ca330503d9f0306bcc77074ee275277e4ef5900ebae3efb1.exe 81920  86db9496e40088febba982bf16dfac05 
405a6bb64662a6d2551455d9062e85b53bf090e105b930b09fa748b2a0f52b3d.exe 87552  7c1d34b220c7c4925d61766615aae8ff 
2748e738718b91ba3bfc7f1f249a63625314dc5ddc8a2314e95e7118275a13e2.exe 172544  6556dae020b1cac662975496a244f532 
9c6895db31d789732fa775c96093a10a0b8474ef7fe56c12323fd28e214f3593.exe 178688  ae390474c0a99a4f387fee6577e7999b 
a1cd460a49ce15473a6774112c4a68ad44c9679c.bin.exe 178688  07aeef056ad8467b8b3028d414f4fa80 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware