Home / Spyware Encyclopedia / Rootkit.Agent.delg << Back

Recommendation to Automatically remove Rootkit.Agent.delg


Our products can remove Rootkit.Agent.delg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.delg Details


  • Category Rootkit
  • Discovered 5/24/2013 1:17:21 AM
  • Modified 2/16/2024 5:11:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
684915dd356ce0909125952c37ac6ec8.exe 81408  684915dd356ce0909125952c37ac6ec8 
qqttvvx.exe 81920  5df1dc2106e8cae806c2ccff5e6c8ac2 
dfhkmor.exe 84480  22e4a6baffc4bf6c12b2b30b1ab37e0d 
73a3cd32a762f3c8d5ee1166c91a011c8ee8a6dad71f5dc9022aba8a17926900.exe 87552  067ab70f60aa381e76f5e3b26510cf47 
2b198cc84ce36906a9ba6db02fca7695.exe 81920  2b198cc84ce36906a9ba6db02fca7695 
2ece23415a8205b0ca330503d9f0306bcc77074ee275277e4ef5900ebae3efb1.exe 81920  86db9496e40088febba982bf16dfac05 
445adc261264f1c004c1ade12e4774b3.exe 87552  445adc261264f1c004c1ade12e4774b3 
9c6895db31d789732fa775c96093a10a0b8474ef7fe56c12323fd28e214f3593.exe 178688  ae390474c0a99a4f387fee6577e7999b 
a25b28d88ad125f4f802b5739aac8be40e2355dfc9399e8bbba3dac7317e94f1.exe 87552  b126c51f38c98bf3fc883310b9c8e63b 
4c69d6c7a6863ecf65ff9d3aaa288971039794ff.bin.exe 87552  72a8a6b0027f56826d6d6c2619ae2629 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware