Home / Spyware Encyclopedia / Rootkit.Ressdt.jz << Back

Recommendation to Automatically remove Rootkit.Ressdt.jz


Our products can remove Rootkit.Ressdt.jz and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Ressdt.jz Details


  • Category Rootkit
  • Discovered 3/31/2011 2:16:23 PM
  • Modified 7/24/2023 3:06:44 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
117c494767486dd3d6c0e6f6aba7b926c612a7a96143eb7f1b8b155d4961504b.sys 2192  64d33f875c8265821235d8a60d462083 
10e3e7ee85413d07faffebb2017686ff.sys 1792  10e3e7ee85413d07faffebb2017686ff 
3d8fe9c7544d1d0731f2588e4d99b785dedd244b276e1a73c6707103a507d058.sys 2192  e54c4cead46c827ecaad495cc6476459 
658b49810da2c6914ef0a49c8677900e.sys 1792  658b49810da2c6914ef0a49c8677900e 
19ce547736dab6e60f038d28c8c68c54.vir.sys 16384  19ce547736dab6e60f038d28c8c68c54 
4f0a9e53f109dc886710ea0393d463b3b1a889907bf970e660aa83636889b459.sys 8192  14c2f48123c153952124b189051fe60b 
a64b0f56ccf6bd3ea375ae03a7fec6c6.vir.sys 2192  a64b0f56ccf6bd3ea375ae03a7fec6c6 
b5d5204a1ee0c146a469162cc0d9f525.vir.sys 2192  b5d5204a1ee0c146a469162cc0d9f525 
3db9103ade36225ec61c3c5b30e4bb71.vir.sys 2192  3db9103ade36225ec61c3c5b30e4bb71 
8f22bb12d964b2a51ac52570595ecfaa.vir.sys 8192  8f22bb12d964b2a51ac52570595ecfaa 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware