Home / Spyware Encyclopedia / Rootkit.Hodprot.ds << Back

Recommendation to Automatically remove Rootkit.Hodprot.ds


Our products can remove Rootkit.Hodprot.ds and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.ds Details


  • Category Rootkit
  • Discovered 1/12/2014 9:56:24 PM
  • Modified 3/4/2024 10:10:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1f2c88fd.exe 12640  6030eeec4548decd7220ea6712f6e289 
cff5ef0c.exe 12960  ac9c57b35e0560d1636537dfd7a60b0b 
90e16729922a1fcfd81dd8a16cf57a1042cad6a61be70865e7aeb3b9f4acde7956ee62373cecb110c1cdc142ae53b14052a.sys 12288  f8b30ae6b0e691a2b063633069c8e370 
d024529a70088417818b12b9f4184b8c.sys 12288  d024529a70088417818b12b9f4184b8c 
15e816f5c483574422ae674428daf43d.sys 12800  15e816f5c483574422ae674428daf43d 
2bd75a4ac803abb4b5191bbe830d57a059e725409c4216c0ec9a3b3977dfe79f.sys 12480  1fc8c23209e209fcd3aace76ae9bcd8c 
b8816b06c8674af4a6c0d1accbb6593a6836f65614ccfacf4bd6b3a17221525a.sys 12576  030fc8247e4b307e18c918b5a757e9f7 
7f1b3888d52458fdc4bb10d4e9de4f01.vir.sys 12352  7f1b3888d52458fdc4bb10d4e9de4f01 
9f2be186ac5722aab2a293b455c78574.vir.sys 12288  9f2be186ac5722aab2a293b455c78574 
2ac75c0a93d52671ef592a0baaba9f7b.vir.sys 12832  2ac75c0a93d52671ef592a0baaba9f7b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware