Home / Spyware Encyclopedia / Rootkit.Delf.c << Back

Recommendation to Automatically remove Rootkit.Delf.c


Our products can remove Rootkit.Delf.c and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Delf.c Details


  • Category Rootkit
  • Discovered 2/7/2013 12:49:03 PM
  • Modified 5/15/2024 9:59:58 AM
  • Threat Level High
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ACA7BFB0.DLL 29696  f6281d16367e59febd8263e0a907371b 
68166BC5.DLL 15360  37937485a9ea38d8b3ece81f3ddb2169 
rootkit.win32.delf.c 21504  d7031ddb9a23315f904d247d0c50b3e0 
f1f60f19cd266e05cf5a58a113296a78.dll 29696  f1f60f19cd266e05cf5a58a113296a78 
f4d570246f0483fdbaf9c6235554b3b1.dll 48640  f4d570246f0483fdbaf9c6235554b3b1 
8401c6fe14a6c71d919a327362241c0c79b8f387640d2411006256b3c2c78d6b.dll 17757  1070c42435b809cbabfcfaa9f34cc868 
75fc2063316ce59138685384cc89e28347a41a5dca1cf052ca40f8844b426993.dll 32536  17ba1eefb33338a31fe0e4dbf1137139 
465f2e65100c4c1d521e0b5f8c83ffe9.vir.dll 29184  465f2e65100c4c1d521e0b5f8c83ffe9 
e3a02744d8eafb53c3813720248d0fe9.vir.dll 122882  e3a02744d8eafb53c3813720248d0fe9 
495c3468f6788aa594fd860c2c1072a8.vir.dll 139264  495c3468f6788aa594fd860c2c1072a8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware