Home / Spyware Encyclopedia / Rootkit.Protector.x << Back

Recommendation to Automatically remove Rootkit.Protector.x


Our products can remove Rootkit.Protector.x and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Protector.x Details


  • Category Rootkit
  • Discovered 8/8/2023 1:37:35 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b4152a6cca95db143dfc261413e750b99a3d49dcf46cd762ac6685f139bc56df.sys 30848  55d69ae45be21422f338ea2f824e32cf 
0e1ec1df12be284f8452fe260706a335.vir.sys 30848  0e1ec1df12be284f8452fe260706a335 
9c11f69f42dcf3c486e3e8fd7241ada9.vir.sys 30848  9c11f69f42dcf3c486e3e8fd7241ada9 
211f96c0f31e0bfc55b90334875791da.vir.sys 30848  211f96c0f31e0bfc55b90334875791da 
rootkit.win32.protector.x-84de984f658704e9081fe023f0ab3963a6ce456c.exe 30848  775f7c5d341cf1124388a3e47132631709/08/2023
virusshare_bcdd6ae7e18e9f94f756a5a4be2b85e8.exe 30720  bcdd6ae7e18e9f94f756a5a4be2b85e820/07/2023
11146cafb3b778e85dfa7e1e2b166c8c14ed4700.bin.exe 30848  b38acaee547b4b7d0c3ace8de45d698407/02/2023
14c520711abbf51221b725cf3c29cdac.sys 30720  14c520711abbf51221b725cf3c29cdac16/05/2022
4f3c9b049f24221e50721ad3914f6905.exe 30720  4f3c9b049f24221e50721ad3914f690511/12/2020
1a2837e0b9c8e8660c4eacd2a4afdda8.exe 30720  1a2837e0b9c8e8660c4eacd2a4afdda827/05/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware