Home / Spyware Encyclopedia / Rootkit.Agent.bewl << Back

Recommendation to Automatically remove Rootkit.Agent.bewl


Our products can remove Rootkit.Agent.bewl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Agent.bewl Details


  • Category Rootkit
  • Discovered 9/25/2012 7:10:42 AM
  • Modified 7/25/2023 10:33:50 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
one.sys 6912Lenovo (Beijing) Limited1.0.0.0ae4d1516722293b9f1e97f237c2a6d6d 
7c4e60b0559c25548a220495778bed1c.exe 1032192  7c4e60b0559c25548a220495778bed1c 
18979fda3147f142e014343104bea602.exe 140800  18979fda3147f142e014343104bea602 
141f84ff9c8f411af5fcf7db866f8887.exe 1032192  141f84ff9c8f411af5fcf7db866f8887 
2803d7ae3c0ccb42351880c7f62a9474.exe 1032192  2803d7ae3c0ccb42351880c7f62a9474 
3a46558d77020c0ecb1d28a7d122a299.exe 1032192  3a46558d77020c0ecb1d28a7d122a299 
cad2d3c9be61c0bfa8f6d86b272c6cd0.exe 1032192  cad2d3c9be61c0bfa8f6d86b272c6cd0 
349f398159714959146e5474a878c607cf2c2bb39acc85f2e85e26bdd20be99f.exe 41984  e96c9d04123ed211b4f228772102a662 
facd4c850c46e08e3ba049e7cecd9f308747fd99865947dd12771ac89870d9c5.exe 977920  3e40f6d31fcab77b21bfc371e7bd95c7 
16513307977dd50bf66d1482bb10578d29dafec15e81dbc04517d77ac146786f43abe7060cc58a159a5aad9662ff1.exe 978432  da30d39829039fc1b982f8f84d43febe 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware