Home / Spyware Encyclopedia / Rootkit.Hodprot.ds << Back

Recommendation to Automatically remove Rootkit.Hodprot.ds


Our products can remove Rootkit.Hodprot.ds and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.ds Details


  • Category Rootkit
  • Discovered 1/12/2014 9:56:24 PM
  • Modified 3/4/2024 10:10:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1f2c88fd.exe 12640  6030eeec4548decd7220ea6712f6e289 
cff5ef0c.exe 12960  ac9c57b35e0560d1636537dfd7a60b0b 
90e16729922a1fcfd81dd8a16cf57a1042cad6a61be70865e7aeb3b9f4acde7956ee62373cecb110c1cdc142ae53b14052a.sys 12288  f8b30ae6b0e691a2b063633069c8e370 
8a5eb826c9d794267f40f5bac7ca8336.sys 12768  8a5eb826c9d794267f40f5bac7ca8336 
d024529a70088417818b12b9f4184b8c.sys 12288  d024529a70088417818b12b9f4184b8c 
6034a4da79e0928b97dc64332d957e7f.sys 12640  6034a4da79e0928b97dc64332d957e7f 
15e816f5c483574422ae674428daf43d.sys 12800  15e816f5c483574422ae674428daf43d 
80835720d43681ced2c782f44beb78d53f68275a9004c5df09540b940010f045.sys 12384  5ad2b39ba98a1b338e4e66f8b71db70f 
04362ac3c274ee7fb2ec4a2fa0a09cd6.vir.sys 12320  04362ac3c274ee7fb2ec4a2fa0a09cd6 
2bd75a4ac803abb4b5191bbe830d57a059e725409c4216c0ec9a3b3977dfe79f.sys 12480  1fc8c23209e209fcd3aace76ae9bcd8c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware