Home / Spyware Encyclopedia / Rootkit.Ressdt.cw << Back

Recommendation to Automatically remove Rootkit.Ressdt.cw


Our products can remove Rootkit.Ressdt.cw and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Ressdt.cw Details


  • Category Rootkit
  • Discovered 6/27/2012 12:01:52 PM
  • Modified 7/24/2023 3:07:45 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
26f33b5c1e1f5981ef9aa93dec68d450b077daabfd032a7fc5b0a2f5cc9bc2c0cd3133e3e70369f3f9e658e819b75688a53.exe 189755  f20ccb255dd86e2b9a388f7191ac6a68 
e5263419d242672a183e060a488f3757.vir.exe 81407  e5263419d242672a183e060a488f3757 
0d3640e8bca64db5584afb26ab00ed405173421bdf61fe3e7b1a3586c0145f52.exe 175616  d75c7f76a0f26b5deae14c2291190da9 
72ec6885c339ec41340e338a3d44d3731f08552232579d20ac5b4b7ada91fb9b.exe 184320  cc77c2531f329326f703df4cd5050355 
49bc91c0c89d1c53b1a749e310d9fd085850e38d7aa09c5b2a005006dd0104fb.exe 81407  04fdf08e7cdc610501a0defe8eeba1d5 
03281daba2ee658c2135ebfd75f5713d.exe 442368  03281daba2ee658c2135ebfd75f5713d 
b4efb61f2df864521aa1a4da66a3a19d.exe 438272  b4efb61f2df864521aa1a4da66a3a19d 
d3290de34ec0a3ab23f5edfa15461bc0.exe 442368  d3290de34ec0a3ab23f5edfa15461bc0 
57b234fd00edddaf5dec366beffc871f0c2a99ee913cdf02384a84c75a90f920adfa3d65cf3d53cec5b09f0c70177a54f23.exe 442368  9e28c7be3aa00e3eeed2fe49a855651b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware