Home / Spyware Encyclopedia / Rootkit.Agent.cwyk << Back

Recommendation to Automatically remove Rootkit.Agent.cwyk


Our products can remove Rootkit.Agent.cwyk and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.cwyk Details


  • Category Rootkit
  • Discovered 9/20/2012 4:36:35 AM
  • Modified 7/12/2023 5:43:43 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fd272fce6c9b937240db903edceedd45.sys 10176  fd272fce6c9b937240db903edceedd45 
b27908c4d05cc20a6aa6787940640b78819b9ae724a681986c878548c43c0c8b.sys 10176  0a4e144c5e9b325bfa4176d4790093f3 
73aadef858e9ea0394465300308d7b0b.sys 10176  73aadef858e9ea0394465300308d7b0b 
c2a6ff490a833c364196f09ae13a2877.sys 10176  c2a6ff490a833c364196f09ae13a2877 
1500340592541b0b0d5df0142a616e50fdddde418a3566ba8cc68ade6c8f7ad1be97503c783ae2b57b4e5e7238f6d.sys 10176  53f318ef28f948b437d015db16ceea72 
ba215eef0b52445f0a96838ed1ae2083a7082e9def3ce7f5caeb3ca8197dd40f.sys 10176  5e275eb98ca93e5df83d43fee9d6319b 
78cf4d9ed7fe37169f0c03578c8ac5fc.vir.sys 10176  78cf4d9ed7fe37169f0c03578c8ac5fc 
95a7a12694ad959c3624b7b6974a60b5.vir.sys 10176  95a7a12694ad959c3624b7b6974a60b5 
b9b1d68ff6adae4cea08435673d18ed1.vir.sys 10176  b9b1d68ff6adae4cea08435673d18ed1 
dd3a2b0fef704d8af900d6d6912ffae3.vir.sys 10176  dd3a2b0fef704d8af900d6d6912ffae3 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware