Home / Spyware Encyclopedia / Rootkit.Agent.cwyk << Back

Recommendation to Automatically remove Rootkit.Agent.cwyk


Our products can remove Rootkit.Agent.cwyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwyk Details


  • Category Rootkit
  • Discovered 9/20/2012 4:36:35 AM
  • Modified 7/12/2023 5:43:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
938d0fed5c1bc86363306304c55f531e.sys 10176  938d0fed5c1bc86363306304c55f531e 
4256479ddc0cb80494a6eb18f04e773d.sys 10176  4256479ddc0cb80494a6eb18f04e773d 
fd272fce6c9b937240db903edceedd45.sys 10176  fd272fce6c9b937240db903edceedd45 
5d432b2d5d830eb31f73ca3081ae0340.sys 10176  5d432b2d5d830eb31f73ca3081ae0340 
48517e7d167f3d0cbfea09e9e84dd32c.sys 10176  48517e7d167f3d0cbfea09e9e84dd32c 
1b355923c7605175b843e4ee80fba9612f3c14eb.bin.sys 10176  9a4b07cffb364f21ba7dcd7ab90e1c77 
9aba7d89fe074e05e1a63f0a5a4faad16c325a1f.bin.sys 10176  b31e1df2c224a3ee0e1c7a5255c65267 
73444e471b34d7c0aab5254d4185786a.sys 10176  73444e471b34d7c0aab5254d4185786a 
7f437b14885dc0d3feddcd5059522a13.sys 10176  7f437b14885dc0d3feddcd5059522a13 
2f35c8dd50ccb4dda39c282210ba42b8783f432d.bin.sys 10176  f498ea9a91a4f84394fcb94207ef214b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware