Home / Spyware Encyclopedia / Rootkit.ressdt.og << Back

Recommendation to Automatically remove Rootkit.ressdt.og


Our products can remove Rootkit.ressdt.og and thousands of other Virus and Spyware automatically and instantly.

Rootkit.ressdt.og Details


  • Category Rootkit
  • Discovered 6/25/2018 3:14:22 PM
  • Modified 8/6/2023 10:23:34 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b300f2a033a0ce0924d42428f14b47a9.sys 2049  b300f2a033a0ce0924d42428f14b47a9 
4e225e97b464d17f4a1d50ae102db8b32db4e68bea0ce430b331418cc212723a.sys 2176  83828785cef22a68ba12947caa5d67bd 
5edb6b072d58a5470183be10fe7b90fe.vir.sys 2048  5edb6b072d58a5470183be10fe7b90fe 
72215cc6690c4eed006e515d9c81de91.vir.sys 2048  72215cc6690c4eed006e515d9c81de91 
virusshare_8d3146dd4a981956e6b23467fcf2c34b.sys 2176  8d3146dd4a981956e6b23467fcf2c34b06/08/2023
6dfb5255bdc3dd95ee3e5f8cc7dcce95.sys 2176  6dfb5255bdc3dd95ee3e5f8cc7dcce9527/07/2023
e5dbf4928392efb5e7f84e3456fb5dcdb64d3ab7ef6d178cd8a2badac498e92484deedebaf80a815e10c25088c05edd9f38.sys 4700  5ea76707df901d6c088915d1f6074c4027/07/2023
b300f2a033a0ce0924d42428f14b47a9.sys 2049  b300f2a033a0ce0924d42428f14b47a917/06/2020
cc745debc63271346b978bed4165089b.vir.sys 2048  cc745debc63271346b978bed4165089b 
473108f7ca21d27a603a706b34cd2b46.vir.sys 2048  473108f7ca21d27a603a706b34cd2b46 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware