Hostify Ads
Posted: March 19, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 13,498 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 8,291 |
First Seen: | March 19, 2016 |
---|---|
Last Seen: | October 9, 2023 |
OS(es) Affected: | Windows |
Hostify by CSDI is an unreliable application that the experts classify as a Potentially Unwanted Program (PUP). The developers of this tool claim that Hostify can turn your PC into a Wifi Hotspot. Allegedly, Hostify should let you share your Internet connection with your friends and relatives by clicking a simple button. This promise is very misleading. If you don't have a router, there is no way to turn your machine into a signal-transmitting device. However, if you have a router, you will not need this software to set it up. CSDI announces this feature just to promote the PUP's installations. After this questionable program sneaks in, Hostify may compromise your Web clients. Hostify may create an extension in each of the present browsers, including Google Chrome, Mozilla Firefox and Internet Explorer. The plugin may change an array of settings automatically. As a result, you may find your homepage replaced by an unreliable search provider. Even if this site seems legit to you, you should not trust Hostify because it may display too many sponsored links. Hostify also may exhibit typical adware capabilities. Hostify may bombard you with tons of pop-ups, banners, interstitial ads, embedded videos and other commercial materials. Some of them may be discount coupons or offers that may lead you to shopping platforms that don't represent an immediate danger. However, other ads may be fraudulent. They may state you are infected with various cyber threats to make you feel you need assistance. If you dial the provided phone number, you may reach con artists who may want to charge you a fee for nothing. In some cases, the ads by Hostify may load sites that exist only to spread harmful software. Even if you stay away from the marketing elements, you may notice various performance issues with your browsers such as speed drops or freezes. You should consider deleting the PUP with a trustworthy security application to spare yourself the trouble and guarantee the stability of your PC.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 49.66 KB (49664 bytes)
MD5: d9ca26072ce52f5ad62790c134b5b556
Detection count: 94
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 447.48 KB (447488 bytes)
MD5: f06b2a9396d4f1569b28ae6ca2adcc52
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 457.72 KB (457728 bytes)
MD5: 8568e50b5f477c4cea1caaf350a71974
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 933.37 KB (933376 bytes)
MD5: a81bd030f1e6b3b8c20ed7e873eeeeea
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 667.13 KB (667136 bytes)
MD5: 53aa6600fdd49bc014af8e74687a786d
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 515.58 KB (515584 bytes)
MD5: 83d4b659e39a226ad50a615029fd7d5b
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 502.78 KB (502784 bytes)
MD5: 4cfc9e951a97b30afacccf1441c69bdd
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 664.57 KB (664576 bytes)
MD5: 5e7a170e88cbcad3234e73135e82795d
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 669.18 KB (669184 bytes)
MD5: f4a9946e41e4e0aef557ee2cb65a3106
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 715.26 KB (715264 bytes)
MD5: 1889a5d8e1fb52c2e4c1f797fb65fe42
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 117.76 KB (117760 bytes)
MD5: 3cba3f60516e0bf2f1f0843a5ff4aae8
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 684.03 KB (684032 bytes)
MD5: 0f889871e8be983bc7c390b544b772ef
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: May 16, 2020
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 622.08 KB (622080 bytes)
MD5: bd5c9cd2bd220f68e7266efd986b8546
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 173.05 KB (173056 bytes)
MD5: 9e98d4d1ab3581763183a3e99f1524f4
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES(x86)%\Hostify\idscservice.exe
File name: idscservice.exeSize: 505.85 KB (505856 bytes)
MD5: d6a4e9095128acb884339a5a0324ef72
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 342.01 KB (342016 bytes)
MD5: 1dad7e338d1c701a187f7606cf8c9577
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
%PROGRAMFILES%\Hostify\idscservice.exe
File name: idscservice.exeSize: 520.19 KB (520192 bytes)
MD5: 65dab626f40f8dd86864306ec5f26fab
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Hostify
Group: Malware file
Last Updated: April 8, 2016
More files
Registry Modifications
File name without pathHostify.lnkHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Hostify_is1
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.