Home / Spyware Encyclopedia / Rootkit.Podnuha.bg << Back

Recommendation to Automatically remove Rootkit.Podnuha.bg


Our products can remove Rootkit.Podnuha.bg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.bg Details


  • Category Rootkit
  • Discovered 4/18/2013 7:14:15 PM
  • Modified 8/9/2023 3:12:08 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0f9cd55690396e0bf42bd8019d700247.dll 95744  0f9cd55690396e0bf42bd8019d700247 
114fccc115c6916a8440133c1963e879.vir.dll 249663  114fccc115c6916a8440133c1963e879 
1c6c8d1b9b35d66a5088d3cc2326b100.dll 249663  1c6c8d1b9b35d66a5088d3cc2326b100 
12f86b6efc59d307bbb0bdaddaed22c4ec5bd8a6ad18e5b5d447c743e761d75b.dll 249663  051af28fb759db53d7c9a066d26c3545 
8dcdf1416aad926d59c6b6985f2235738c78672aeb47b649947465f9f8d99be4.dll 249663  037422fa48f4158a1ffe4169bdcb4cf6 
ceb8822ad1950f466a7fc19989319d97.vir.dll 88064  ceb8822ad1950f466a7fc19989319d97 
ffb19d48300778dfaeea435c642e7d37.dll 88064  ffb19d48300778dfaeea435c642e7d3721/08/2020
406e695429237fbc4ae8bd8371dc5b3e.vir.dll 205824  406e695429237fbc4ae8bd8371dc5b3e21/07/2023
19df634ad1f7ebb37066e54882ad1521.dll 249663  19df634ad1f7ebb37066e54882ad1521 
a935a95495f35300006c134edc24b69e.dll 229888  a935a95495f35300006c134edc24b69e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware