Home / Spyware Encyclopedia / Rootkit.Agent.cwrt << Back

Recommendation to Automatically remove Rootkit.Agent.cwrt


Our products can remove Rootkit.Agent.cwrt and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwrt Details


  • Category Rootkit
  • Discovered 7/20/2012 8:04:25 PM
  • Modified 8/16/2022 1:52:01 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
db3c7102cde01701de26894541033445.vir.sys 72072 1, 0, 0, 199db3c7102cde01701de26894541033445 
181901a85cb149767a7199748c0b2c76.vir.sys 88264 1, 0, 0, 197181901a85cb149767a7199748c0b2c76 
14bf782614b20045da78867b531bf6f7.vir.sys 78212 1, 0, 0, 19914bf782614b20045da78867b531bf6f7 
79e8d591f165b83ebf42588c183fbd47.vir.sys 88264 1, 0, 0, 19779e8d591f165b83ebf42588c183fbd47 
b3bd74c87303c2e275d86c5f961d61ffdc2e45424217ac6502aa0ae5625e346c.sys 88264 1, 0, 0, 1971aa31fb592f778b05d7479a94badb7f5 
414a80fe29faf713898644f3c2a056c2e8ad57c1.bin.exe 437984  83dc40409787feb7f6c00efcaed5f078 
1f862a50e30c8f0581500eb6df297b50583df50adb90e66f5a54ecd92c89c966.sys 81388 1, 0, 0, 199b318752fddd93069c03e705bf1fa1593 
2c78689b8edc247a563f80f19559357a1d2ab7962b94c2888c12ecb3d515c194.sys 88264 1, 0, 0, 19719f07d348f34ac026ed8b97ee62f58c3 
eb19180c3ee3bf54bcf738a0abeaccf2.sys 81388 1, 0, 0, 199eb19180c3ee3bf54bcf738a0abeaccf2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware