Home / Spyware Encyclopedia / Rootkit.Agent.bewl << Back

Recommendation to Automatically remove Rootkit.Agent.bewl


Our products can remove Rootkit.Agent.bewl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bewl Details


  • Category Rootkit
  • Discovered 9/25/2012 7:10:42 AM
  • Modified 7/25/2023 10:33:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7c4e60b0559c25548a220495778bed1c.exe 1032192  7c4e60b0559c25548a220495778bed1c 
141f84ff9c8f411af5fcf7db866f8887.exe 1032192  141f84ff9c8f411af5fcf7db866f8887 
349f398159714959146e5474a878c607cf2c2bb39acc85f2e85e26bdd20be99f.exe 41984  e96c9d04123ed211b4f228772102a662 
facd4c850c46e08e3ba049e7cecd9f308747fd99865947dd12771ac89870d9c5.exe 977920  3e40f6d31fcab77b21bfc371e7bd95c7 
17363104843667205f3956bdaaaf0bda951f92791ea6d9d3ceb95eec50f1fc6eb7c50c8fef8d055b6d4d86ff6e05d.exe 978432  32cb135043c1cc608758dbc0d652260f 
4a02dd35cd9ea71f3e2b1a1797ddb3aa.vir.exe 140800  4a02dd35cd9ea71f3e2b1a1797ddb3aa 
7c4e60b0559c25548a220495778bed1c.exe 1032192  7c4e60b0559c25548a220495778bed1c24/05/2020
a073b2b756c28951ed3923978cba9c2d.vir.exe 978432  a073b2b756c28951ed3923978cba9c2d 
defe90b51d7bad5bbcfd35ced7097167.exe 140800  defe90b51d7bad5bbcfd35ced7097167 
16513307977dd50bf66d1482bb10578d29dafec15e81dbc04517d77ac146786f43abe7060cc58a159a5aad9662ff1.exe 978432  da30d39829039fc1b982f8f84d43febe 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware