Home / Spyware Encyclopedia / Rootkit.Hodprot.at << Back

Recommendation to Automatically remove Rootkit.Hodprot.at


Our products can remove Rootkit.Hodprot.at and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Hodprot.at Details


  • Category Rootkit
  • Discovered 6/16/2011 9:45:46 AM
  • Modified 4/9/2020 5:48:17 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
36B5A36CE454F5AC31F45C5F2875A8934A8AC480.{PE}.sys 12128  c940b7a555e1be4da0462649a6e399c909/04/2020
5182996f40b6af5718617a5274912f4d88d692d450977b28afbf4ce0765f502abddb1edfc5102660f0c01ee3d5cee46a69d4ad7b84241bd76c7342f5207bd045.sys 12128  fcc8da967f9544bd25babe68db2e1a4e09/04/2020
07d695104468f66f7c46f4c8123dc5b6.sys 12128  07d695104468f66f7c46f4c8123dc5b609/04/2020
A8C14E8B500ED60DEAAAEA5A7FA3EF10B3F30A56.{PE}.sys 12128  8a80e21c7dea8ebf41fdb043d03dcf9b09/04/2020
F0DFDB4A208E68B4D8785E3F163C46721BD55918.{PE}.sys 12128  afbb69663f57680b941fa9b2d48ddc2309/04/2020
4C58A093845E74D784FC56E37C3FFE836D610060.{PE}.sys 12128  7f43da9f92ba0b936e26af428077054109/04/2020
EB60F60F7EE51618D1B6B6E7A4110DA17D8C9046.{PE}.sys 12128  c8d047510a294aa0823a9d93b38949fc09/04/2020
0c8277212168de38d7c1b343fda51862.ADMINUS.sys 12128  0c8277212168de38d7c1b343fda5186209/04/2020
490ef859c3105d1ca6bd43064d2dbfdd.ADMINUS.sys 12128  490ef859c3105d1ca6bd43064d2dbfdd09/04/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware