Home / Spyware Encyclopedia / Rootkit.Ressdt.dhs << Back

Recommendation to Automatically remove Rootkit.Ressdt.dhs


Our products can remove Rootkit.Ressdt.dhs and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Ressdt.dhs Details


  • Category Rootkit
  • Discovered 7/26/2018 1:28:48 PM
  • Modified 8/6/2023 5:37:21 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
kkumvs.bin.sys 29568  b7c9a0d1b031ba989bf5ea94cc80c470 
thhtxr.bin.sys 29568  836a7656e5ed4902ba157170d52cfd12 
1443420015202b5d0b66c4ac519c45ec2ec5ffc8f6f9edf0b6b35f465e66f1007074af06245213b2e7bfdd47d6286.sys 29568  55c2f80b44157d892be8328f42387662 
1746290218349219da4737a2b9da528abd376fd2a03967355ef3d3c9f93c18c0752fd34ca34870825f41b7e89c085.sys 29568  21ecc0e6ac69e2c82509ee77b9ed4900 
e77f63dc7cf811e074bbb54efdc7d14c8cbb96f6.bin.sys 29568  712dc7745f89c40c11305bc79cfc30a4 
3a45bdbea1f62d5d9fe252540ade8ffbc02c7a3d402e06d78a9237e97fb02b04.sys 29440  d02cb8ee3e07442ef05d324281e56148 
8072281781101018312c5bca2700b632.sys 29440  8072281781101018312c5bca2700b632 
ed2e60af90748b88e6aea44eb65c5174a7f0f1dc.bin.sys 29568  1ed2988599135c942b941b477837682a 
9fe53ce73cecfccd7ae563ebdd0e9bfa.sys 29568  9fe53ce73cecfccd7ae563ebdd0e9bfa 
e810abde24fed68d25001a16977f729a.sys 29568  e810abde24fed68d25001a16977f729a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware