Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
qqttvvx.exe 81920  5df1dc2106e8cae806c2ccff5e6c8ac2 
684915dd356ce0909125952c37ac6ec8.exe 81408  684915dd356ce0909125952c37ac6ec8 
d432502e301458a4f8461508566e5a75c47d50c6.bin.exe 270848  d73a0ca36c69275c411499239c6b98bf 
bjrrziy.exe 85504  535fcc3313187d1469acfe112bc81d8b 
e47ba5f59eb23654f60e2d9562f5a721.exe 81920  e47ba5f59eb23654f60e2d9562f5a721 
6e38e8c62d7e3e16f2f5db7789eefdff.exe 122363  6e38e8c62d7e3e16f2f5db7789eefdff 
4e8721375b437b15176c2964458e30cc.exe 270848  4e8721375b437b15176c2964458e30cc 
a1cd460a49ce15473a6774112c4a68ad44c9679c.bin.exe 178688  07aeef056ad8467b8b3028d414f4fa80 
a9833e6d33456c0daa8601c8f3be6c74b17aee63.bin.exe 178688  81e25ee30e8a28b0f6231d7c4422107f 
2af0ffc24f87a31b9a7df37e66c4250ad638365a72a41959a361dbd2635c21b0.exe 96768  7efab5750605806bc18c5ec89096d093 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware