Home / Spyware Encyclopedia / Rootkit.Podnuha.cb << Back

Recommendation to Automatically remove Rootkit.Podnuha.cb


Our products can remove Rootkit.Podnuha.cb and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.cb Details


  • Category Rootkit
  • Discovered 8/8/2023 1:40:27 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
rootkit.win32.podnuha.cb 205824  07acde5d5d55f3ce21663eda2ba11099 
a8806d931e2f320531d05e1cc78d72d4.dll 249663  a8806d931e2f320531d05e1cc78d72d4 
99d676b2d5d42361afb3ec2312e1a79327fb6f3569c41df2d28f794906b3737d.dll 249663  0383fefe5fb62c06c6a7fbb34034514f 
16f54fc24ef9b9448ef34358ebeb23eeda058096ec12a0b95f00ef1adb991151.dll 249663  1e0df1208df447ab5191deae09a12ac8 
3e8a0d2c5f87d2c0a8fa90222df70699.vir.dll 108288  3e8a0d2c5f87d2c0a8fa90222df70699 
rootkit.win32.podnuha.cb-40e1be47e5ef4c03bce2c894cc3580e971f09479.exe 249663  1f777f790f1ab6a1863ae326a84d4dd009/08/2023
08629416be6eb03d7f8fb55c431ed1fa.vir.dll 88064  08629416be6eb03d7f8fb55c431ed1fa 
6f90a7e1cb9aba45aa0d79bbaa7fa752.vir.dll 251904  6f90a7e1cb9aba45aa0d79bbaa7fa752 
2b402282c43a43b7bd7d0bb3e1df0bb9.vir.dll 229888  2b402282c43a43b7bd7d0bb3e1df0bb9 
c1458e6129cf8ad7ed340a915a9c8c5b.vir.dll 88064  c1458e6129cf8ad7ed340a915a9c8c5b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware