Home / Spyware Encyclopedia / Rootkit.Hodprot.ds << Back

Recommendation to Automatically remove Rootkit.Hodprot.ds


Our products can remove Rootkit.Hodprot.ds and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.ds Details


  • Category Rootkit
  • Discovered 1/12/2014 9:56:24 PM
  • Modified 3/4/2024 10:10:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7f1b3888d52458fdc4bb10d4e9de4f01.vir.sys 12352  7f1b3888d52458fdc4bb10d4e9de4f01 
15e816f5c483574422ae674428daf43d.sys 12800  15e816f5c483574422ae674428daf43d22/07/2020
c341f58ce70d44b5b2e046a86b12e94b.sys 12640  c341f58ce70d44b5b2e046a86b12e94b21/08/2020
56cdd11249080144db28772243c635d4.vir.sys 12576  56cdd11249080144db28772243c635d403/08/2023
79c4970c.exe 12480  b32ecc2257554e2bfc9cbb1786f440d211/12/2020
rootkit.win32.hodprot.ds.2cd1a28a8b430550c708b7e6b8f372f9.exe 12416  2cd1a28a8b430550c708b7e6b8f372f901/09/2020
rootkit.win32.hodprot.ds.d28de402e287728dae0a6472ece8f790.exe 12320  d28de402e287728dae0a6472ece8f79021/08/2020
cfb8a0f2b9e76f184bb10cffa66cf63eca9ee73363e6faa2f2f64ba4ddbbfbfa.sys 12768  f5ac6c5500c64eb3558762dab9b50bd113/08/2020
cff5ef0c.exe 12960  ac9c57b35e0560d1636537dfd7a60b0b22/07/2020
rootkit.win32.hodprot.ds.202a99ca9603e88520d6e65e5b0d0790.exe 12864  202a99ca9603e88520d6e65e5b0d079024/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware