Home / Spyware Encyclopedia / Rootkit.Hodprot.ds << Back

Recommendation to Automatically remove Rootkit.Hodprot.ds


Our products can remove Rootkit.Hodprot.ds and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.ds Details


  • Category Rootkit
  • Discovered 1/12/2014 9:56:24 PM
  • Modified 3/4/2024 10:10:58 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
4f739902.exe 13120  8e7c41224b308c37ad715c38151ca3bb 
90e16729922a1fcfd81dd8a16cf57a1042cad6a61be70865e7aeb3b9f4acde7956ee62373cecb110c1cdc142ae53b14052a.sys 12288  f8b30ae6b0e691a2b063633069c8e370 
8a5eb826c9d794267f40f5bac7ca8336.sys 12768  8a5eb826c9d794267f40f5bac7ca8336 
d024529a70088417818b12b9f4184b8c.sys 12288  d024529a70088417818b12b9f4184b8c 
477d5494f33ca0e8f3458b3c60ce9604fa7f616ceacb2124194491012a628dcf.sys 12576  d33be1e7bfc4c41e148b956bd0caff7b 
5d821de12b22418a624e22a85797600a5479e2d8ed5c573ba8941477dae150bf.sys 13120  c445f5f0cc3caefcda6c247de7b2ed4c 
6034a4da79e0928b97dc64332d957e7f.sys 12640  6034a4da79e0928b97dc64332d957e7f 
c625ea568ede49018e507de8abc928ff.sys 12480  c625ea568ede49018e507de8abc928ff 
0e081240395c5ad875bff0702182d3c6.sys 12288  0e081240395c5ad875bff0702182d3c6 
15e816f5c483574422ae674428daf43d.sys 12800  15e816f5c483574422ae674428daf43d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware