Home / Spyware Encyclopedia / Rootkit.ressdt.og << Back

Recommendation to Automatically remove Rootkit.ressdt.og


Our products can remove Rootkit.ressdt.og and thousands of other Virus and Spyware automatically and instantly.

Rootkit.ressdt.og Details


  • Category Rootkit
  • Discovered 6/25/2018 3:14:22 PM
  • Modified 8/6/2023 10:23:34 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
88f986c60fd1ebe3ac6ded9183761ebc.sys 2048  88f986c60fd1ebe3ac6ded9183761ebc 
ce631d62136df8cd22174426b11b6a1db18a3908e3561ecd2b81628c9829fedb.sys 2048  1a3e8f1e46fb2ec98cc8f11f198ed251 
5edb6b072d58a5470183be10fe7b90fe.vir.sys 2048  5edb6b072d58a5470183be10fe7b90fe 
72215cc6690c4eed006e515d9c81de91.vir.sys 2048  72215cc6690c4eed006e515d9c81de91 
d0b9834bf758acb1bc17068baf5e488f.vir.sys 2048  d0b9834bf758acb1bc17068baf5e488f 
ce5651f148e50c278994ba38ed0294bd.vir.sys 2176  ce5651f148e50c278994ba38ed0294bd 
6dfb5255bdc3dd95ee3e5f8cc7dcce95.sys 2176  6dfb5255bdc3dd95ee3e5f8cc7dcce9527/07/2023
virusshare_8d3146dd4a981956e6b23467fcf2c34b.sys 2176  8d3146dd4a981956e6b23467fcf2c34b06/08/2023
e5dbf4928392efb5e7f84e3456fb5dcdb64d3ab7ef6d178cd8a2badac498e92484deedebaf80a815e10c25088c05edd9f38.sys 4700  5ea76707df901d6c088915d1f6074c4027/07/2023
b300f2a033a0ce0924d42428f14b47a9.sys 2049  b300f2a033a0ce0924d42428f14b47a917/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware