Home / Spyware Encyclopedia / Rootkit.TDSS.ust << Back

Recommendation to Automatically remove Rootkit.TDSS.ust


Our products can remove Rootkit.TDSS.ust and thousands of other Virus and Spyware automatically and instantly.

Rootkit.TDSS.ust Details


  • Category Rootkit
  • Discovered 5/8/2013 10:47:04 PM
  • Modified 4/29/2021 6:08:38 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7f6de02714f30e607f5a3daae46a7908.exe 124928©Winasm Corporation5.1.5.07f6de02714f30e607f5a3daae46a7908 
973b7984607d977270d9bf6986ef13ff6e571102ee8c125f2a9fec85634ee391.exe 124928©Winasm Corporation5.1.5.09b6c9e3f8304f5241c71db9be0ca0b29 
b6032c04229d4b7158b9c965611c772a.exe 124928©Winasm Corporation5.1.5.0b6032c04229d4b7158b9c965611c772a 
4ba1b2834ab0e1b71403d838fdc66a50.vir.exe 124928©Winasm Corporation5.1.5.04ba1b2834ab0e1b71403d838fdc66a50 
b6032c04229d4b7158b9c965611c772a.exe 124928©Winasm Corporation5.1.5.0b6032c04229d4b7158b9c965611c772a21/08/2020
9f485aef9d2661396813e0f753255eedc74bd01ce9eddde458a71724efa9a79f.exe 124928©Winasm Corporation5.1.5.04ec78f5ea85fce59dd22f280d0389e30 
a2c2aa732ede24beddb869e974a21fb7.exe 124928©Winasm Corporation5.1.5.0a2c2aa732ede24beddb869e974a21fb7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware