Home / Spyware Encyclopedia / Rootkit.Ressdt.lh << Back

Recommendation to Automatically remove Rootkit.Ressdt.lh


Our products can remove Rootkit.Ressdt.lh and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Ressdt.lh Details


  • Category Rootkit
  • Discovered 8/8/2023 1:35:35 PM
  • Modified 8/9/2023 3:12:30 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
43cab57d03d9fdacdf653c274e7f3698fe7dbada7e1c013b84f752183619c43b.sys 2192  0ca96ed7afa992a5614f0920e36c72b9 
b7b3d4eccbf0fe9c28fbd215997d7b85a9802b9cead3224bc2bbfaf7c0c3f28f.sys 2192  8815d38bffd4df24bb14c65ac87ee611 
rootkit.win32.ressdt.lh-ef52329e5d1953f2b192f0494087a2f5127c7073.exe 2192  a31f86fbbfded8fdf4e1f0186cdc881b09/08/2023
0957824a53b733194999e7a1f64b85ddf3d6babcd41863effe201366e6fa4da4.sys 1792  6ab6bde7804d177fde8603810931c38f 
112033037728a13e438c1c8da97436792d8d409f1f41f60cf4f85416947ac546e4afac647160bcf8c324af093a931.sys 13776  3eff83fef05591c77d0823e3a374c165 
eb247ce3ce7b72e6dd40f3c9a6cf9da2.exe 7168  eb247ce3ce7b72e6dd40f3c9a6cf9da2 
2e22b28fdb72893990a25fbd4336f60d2df6ecef.bin.sys 12752  3fdda588e73a7fabe82baae5f92d4bf2 
1ff0814e23e35c19dcc2bf5c5db38999.sys 2192  1ff0814e23e35c19dcc2bf5c5db38999 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware