Home / Spyware Encyclopedia / Rootkit.Ressdt.pf << Back

Recommendation to Automatically remove Rootkit.Ressdt.pf


Our products can remove Rootkit.Ressdt.pf and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Ressdt.pf Details


  • Category Rootkit
  • Discovered 3/19/2013 10:41:28 PM
  • Modified 4/4/2022 2:34:32 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
413bb4a84da4c7d352f02ff4c7750b06.vir.exe 41472Beijing Rising Information Technology Co., Ltd.21.0.0.17413bb4a84da4c7d352f02ff4c7750b06 
972a4aae6ab9ada00bb5967c84d6bba1.vir.exe 28160Beijing Rising Information Technology Co., Ltd.21.0.0.17972a4aae6ab9ada00bb5967c84d6bba1 
fd86ea4af2590170bc11576307e26082.vir.exe 32256Beijing Rising Information Technology Co., Ltd.21.0.0.17fd86ea4af2590170bc11576307e26082 
316ec36e7610fbe7a7e2992973977c3f.vir.exe 41472Beijing Rising Information Technology Co., Ltd.21.0.0.17316ec36e7610fbe7a7e2992973977c3f 
122fa20cca63a5a2c25f9093fca5dc8b26831867a929fe6306db2185aaa5ed1d.sys 4352  b0fd1145eed764443333dff7241f0be0 
f3e72aa8b9afbf3de8ebf8b752f9bf2d.sys 7776  f3e72aa8b9afbf3de8ebf8b752f9bf2d 
d9d447fac838429519b7e79c8c4a08db69853e3f359cd36865011384b9866f47.sys 7776  a4177c35d160ea4654d2cc700b5baa43 
pcidump.sys 4352  f141f12b27be8328c841d5c65ac61b52 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware