Home / Spyware Encyclopedia / Rootkit.Agent.cwey << Back

Recommendation to Automatically remove Rootkit.Agent.cwey


Our products can remove Rootkit.Agent.cwey and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwey Details


  • Category Rootkit
  • Discovered 4/25/2012 12:28:36 AM
  • Modified 7/25/2023 10:33:38 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
98bfc4c26fe4150d50ecc3a75bfc917b.sys 38528  98bfc4c26fe4150d50ecc3a75bfc917b 
86f13265be89d444d04bf1622dfb504c.sys 38528  86f13265be89d444d04bf1622dfb504c 
1d72055a704669b5f5831e41fff8da6d.sys 38528  1d72055a704669b5f5831e41fff8da6d 
cf54520d97568ae6d2666455f6860422.sys 38528  cf54520d97568ae6d2666455f686042205/03/2020
05fc37bda1709eb64eb95b635c5c4e0f.vir.sys 38528  05fc37bda1709eb64eb95b635c5c4e0f 
5a695951442680b15582df58ebd5e2a563888901a28fd8df1f13773863919e8a.sys 55808  6a6f920d1033bb453781159c386f2aa9 
d7898064415dc977dda38b6f98eb4291.sys 38528  d7898064415dc977dda38b6f98eb4291 
efa5d2abb632d5af29177380f8bd17bb.sys 38528  efa5d2abb632d5af29177380f8bd17bb 
5c14559bbbfd59ad0aebbfad607fbf58.sys 38528  5c14559bbbfd59ad0aebbfad607fbf58 
6f2b403401ca3d7a84091aafd6a303e8.sys 38528  6f2b403401ca3d7a84091aafd6a303e8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware