Home / Spyware Encyclopedia / Rootkit.Agent.cwyk << Back

Recommendation to Automatically remove Rootkit.Agent.cwyk


Our products can remove Rootkit.Agent.cwyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwyk Details


  • Category Rootkit
  • Discovered 9/20/2012 4:36:35 AM
  • Modified 7/12/2023 5:43:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1b355923c7605175b843e4ee80fba9612f3c14eb.bin.sys 10176  9a4b07cffb364f21ba7dcd7ab90e1c77 
704ce13875a397806fd9899b9f0f3185.sys 10176  704ce13875a397806fd9899b9f0f3185 
cf0811f1951a313f4c86d80ed33d109d44ab98459303d985cff153e0a169d43b.sys 10176  703caf7dba21454f92b3b29ec39f62f7 
6f478d49d2939c1f6c9d7cbdbc8e58c0738f0fd8e17e0c33c27aa6b74bf89325.sys 10176  60476f144a784d52862186f2ce6330f3 
1500340592541b0b0d5df0142a616e50fdddde418a3566ba8cc68ade6c8f7ad1be97503c783ae2b57b4e5e7238f6d.sys 10176  53f318ef28f948b437d015db16ceea72 
98f031984c63fb271c79406b8d224965.vir.sys 10176  98f031984c63fb271c79406b8d224965 
95a7a12694ad959c3624b7b6974a60b5.vir.sys 10176  95a7a12694ad959c3624b7b6974a60b5 
b9b1d68ff6adae4cea08435673d18ed1.vir.sys 10176  b9b1d68ff6adae4cea08435673d18ed1 
78cf4d9ed7fe37169f0c03578c8ac5fc.vir.sys 10176  78cf4d9ed7fe37169f0c03578c8ac5fc 
dd3a2b0fef704d8af900d6d6912ffae3.vir.sys 10176  dd3a2b0fef704d8af900d6d6912ffae3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware