Home / Spyware Encyclopedia / Rootkit.Podnuha.bre << Back

Recommendation to Automatically remove Rootkit.Podnuha.bre


Our products can remove Rootkit.Podnuha.bre and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.bre Details


  • Category Rootkit
  • Discovered 1/6/2012 9:30:47 PM
  • Modified 8/1/2023 4:13:52 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c351ba262d255d5f58d9b880f9926211cfd7bbb3.exe 376344  8ecfd57b6c9f68341e8549dd3f48bafa 
7b4a4237b0721e3462efaa83942adab8.exe 536576  7b4a4237b0721e3462efaa83942adab8 
1916100515436d3b692c9bec369a1cf713be730a306d2614c86abb1f3cbe116b180eb8c6333a9125fd839bfb28c5f.exe 376320  c97241855909a873e4dccac4f267997f 
343706eaf28f3cbea1b17ee0aab7df28.exe 376352  343706eaf28f3cbea1b17ee0aab7df28 
d1500a42a2765f852c32511a12c7e3c3.vir.exe 376348  d1500a42a2765f852c32511a12c7e3c3 
4a50c1ff233739eecbd4b4886c0685af.vir.exe 376832  4a50c1ff233739eecbd4b4886c0685af 
0ad3aaad355ccb785e2bf3853d432f31.vir.exe 376832  0ad3aaad355ccb785e2bf3853d432f31 
065901a83e63a6deef55d5baae38ae12.vir.exe 552926  065901a83e63a6deef55d5baae38ae12 
5fdbad4e745f9fe889b24f24bfff18ad.vir.exe 327680  5fdbad4e745f9fe889b24f24bfff18ad 
fb96a49b2899cdbf057dda49d52fcbfd.vir.exe 376320  fb96a49b2899cdbf057dda49d52fcbfd 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware