Home / Spyware Encyclopedia / Rootkit.Agent.cwyk << Back

Recommendation to Automatically remove Rootkit.Agent.cwyk


Our products can remove Rootkit.Agent.cwyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwyk Details


  • Category Rootkit
  • Discovered 9/20/2012 4:36:35 AM
  • Modified 7/12/2023 5:43:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
73444e471b34d7c0aab5254d4185786a.sys 10176  73444e471b34d7c0aab5254d4185786a 
6c736a7640d42a4dad3dd462ff3c9fc2.sys 10176  6c736a7640d42a4dad3dd462ff3c9fc2 
7090d73a465a94b6693d7df07778d391.sys 10176  7090d73a465a94b6693d7df07778d391 
cf0811f1951a313f4c86d80ed33d109d44ab98459303d985cff153e0a169d43b.sys 10176  703caf7dba21454f92b3b29ec39f62f7 
6f478d49d2939c1f6c9d7cbdbc8e58c0738f0fd8e17e0c33c27aa6b74bf89325.sys 10176  60476f144a784d52862186f2ce6330f3 
b27908c4d05cc20a6aa6787940640b78819b9ae724a681986c878548c43c0c8b.sys 10176  0a4e144c5e9b325bfa4176d4790093f3 
c2a6ff490a833c364196f09ae13a2877.sys 10176  c2a6ff490a833c364196f09ae13a2877 
3dcc20dc734813f1122f4f3ebb3b4815.vir.sys 10176  3dcc20dc734813f1122f4f3ebb3b4815 
3ece5038fa291771d7e084b129f7561f.vir.sys 10176  3ece5038fa291771d7e084b129f7561f 
6ccb0a485208ec6311d7637409e96116.vir.sys 10176  6ccb0a485208ec6311d7637409e96116 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware