Home / Spyware Encyclopedia / Rootkit.Agent.cwyk << Back

Recommendation to Automatically remove Rootkit.Agent.cwyk


Our products can remove Rootkit.Agent.cwyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwyk Details


  • Category Rootkit
  • Discovered 9/20/2012 4:36:35 AM
  • Modified 7/12/2023 5:43:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
938d0fed5c1bc86363306304c55f531e.sys 10176  938d0fed5c1bc86363306304c55f531e 
fd272fce6c9b937240db903edceedd45.sys 10176  fd272fce6c9b937240db903edceedd45 
73444e471b34d7c0aab5254d4185786a.sys 10176  73444e471b34d7c0aab5254d4185786a 
7090d73a465a94b6693d7df07778d391.sys 10176  7090d73a465a94b6693d7df07778d391 
704ce13875a397806fd9899b9f0f3185.sys 10176  704ce13875a397806fd9899b9f0f3185 
b27908c4d05cc20a6aa6787940640b78819b9ae724a681986c878548c43c0c8b.sys 10176  0a4e144c5e9b325bfa4176d4790093f3 
1500340592541b0b0d5df0142a616e50fdddde418a3566ba8cc68ade6c8f7ad1be97503c783ae2b57b4e5e7238f6d.sys 10176  53f318ef28f948b437d015db16ceea72 
ba215eef0b52445f0a96838ed1ae2083a7082e9def3ce7f5caeb3ca8197dd40f.sys 10176  5e275eb98ca93e5df83d43fee9d6319b 
98f031984c63fb271c79406b8d224965.vir.sys 10176  98f031984c63fb271c79406b8d224965 
ea9eeb7e6e62d04cd7fa50a411542ab4.vir.sys 10176  ea9eeb7e6e62d04cd7fa50a411542ab4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware