Home / Spyware Encyclopedia / Rootkit.Agent.bewl << Back

Recommendation to Automatically remove Rootkit.Agent.bewl


Our products can remove Rootkit.Agent.bewl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bewl Details


  • Category Rootkit
  • Discovered 9/25/2012 7:10:42 AM
  • Modified 7/25/2023 10:33:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
one.sys 6912Lenovo (Beijing) Limited1.0.0.0ae4d1516722293b9f1e97f237c2a6d6d 
349f398159714959146e5474a878c607cf2c2bb39acc85f2e85e26bdd20be99f.exe 41984  e96c9d04123ed211b4f228772102a662 
16513307977dd50bf66d1482bb10578d29dafec15e81dbc04517d77ac146786f43abe7060cc58a159a5aad9662ff1.exe 978432  da30d39829039fc1b982f8f84d43febe 
18979fda3147f142e014343104bea602.exe 140800  18979fda3147f142e014343104bea602 
7c4e60b0559c25548a220495778bed1c.exe 1032192  7c4e60b0559c25548a220495778bed1c 
7c4e60b0559c25548a220495778bed1c.exe 1032192  7c4e60b0559c25548a220495778bed1c24/05/2020
4a02dd35cd9ea71f3e2b1a1797ddb3aa.vir.exe 140800  4a02dd35cd9ea71f3e2b1a1797ddb3aa 
a073b2b756c28951ed3923978cba9c2d.vir.exe 978432  a073b2b756c28951ed3923978cba9c2d 
17363104843667205f3956bdaaaf0bda951f92791ea6d9d3ceb95eec50f1fc6eb7c50c8fef8d055b6d4d86ff6e05d.exe 978432  32cb135043c1cc608758dbc0d652260f 
defe90b51d7bad5bbcfd35ced7097167.exe 140800  defe90b51d7bad5bbcfd35ced7097167 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware