Microsoft Download Center Archive
![]() | Battling the Rustock Threat |
This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
- This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans. The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.
Files
![]() | Status: LiveThis download is still available on microsoft.com. The downloads below will come directly from the Microsoft Download Center. |
File | Size |
---|---|
![]() SHA1: 42bdc1ba288827a9a05ece2122907bd10f08974e | 872 KB |
![]() SHA1: 3c48a6aa910e684ea7fe8503038f57a0d8af930e | 1.02 MB |
File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.
This download includes .xps files. XPS was a Microsoft document format intended to replace PDF. To view these files, you may need to install the XPS Essentials Pack.
System Requirements
Operating Systems: Windows 2000, Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
- Any supported Operating System
Installation Instructions
- Download Battling the Rustock Threat. Available as a PDF or an XPS. In order to view the XPS document, you will need to install the reader (included in Windows 7 and Windows Vista).