Home / Spyware Encyclopedia / Rootkit.Hodprot.ds << Back

Recommendation to Automatically remove Rootkit.Hodprot.ds


Our products can remove Rootkit.Hodprot.ds and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.ds Details


  • Category Rootkit
  • Discovered 1/12/2014 9:56:24 PM
  • Modified 3/4/2024 10:10:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1f2c88fd.exe 12640  6030eeec4548decd7220ea6712f6e289 
cff5ef0c.exe 12960  ac9c57b35e0560d1636537dfd7a60b0b 
90e16729922a1fcfd81dd8a16cf57a1042cad6a61be70865e7aeb3b9f4acde7956ee62373cecb110c1cdc142ae53b14052a.sys 12288  f8b30ae6b0e691a2b063633069c8e370 
d024529a70088417818b12b9f4184b8c.sys 12288  d024529a70088417818b12b9f4184b8c 
5d821de12b22418a624e22a85797600a5479e2d8ed5c573ba8941477dae150bf.sys 13120  c445f5f0cc3caefcda6c247de7b2ed4c 
c625ea568ede49018e507de8abc928ff.sys 12480  c625ea568ede49018e507de8abc928ff 
0e081240395c5ad875bff0702182d3c6.sys 12288  0e081240395c5ad875bff0702182d3c6 
04362ac3c274ee7fb2ec4a2fa0a09cd6.vir.sys 12320  04362ac3c274ee7fb2ec4a2fa0a09cd6 
2bd75a4ac803abb4b5191bbe830d57a059e725409c4216c0ec9a3b3977dfe79f.sys 12480  1fc8c23209e209fcd3aace76ae9bcd8c 
b8816b06c8674af4a6c0d1accbb6593a6836f65614ccfacf4bd6b3a17221525a.sys 12576  030fc8247e4b307e18c918b5a757e9f7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware