Home / Spyware Encyclopedia / Rootkit.Podnuha.bg << Back

Recommendation to Automatically remove Rootkit.Podnuha.bg


Our products can remove Rootkit.Podnuha.bg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.bg Details


  • Category Rootkit
  • Discovered 4/18/2013 7:14:15 PM
  • Modified 8/9/2023 3:12:08 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ffb19d48300778dfaeea435c642e7d37.dll 88064  ffb19d48300778dfaeea435c642e7d37 
1c6c8d1b9b35d66a5088d3cc2326b100.dll 249663  1c6c8d1b9b35d66a5088d3cc2326b100 
ab5fafa544939c3703763da0408dffa279082658f74a7bc15a6514628dcbdf4e.dll 249663  03b516205b7417161a49130a664529ae 
8dcdf1416aad926d59c6b6985f2235738c78672aeb47b649947465f9f8d99be4.dll 249663  037422fa48f4158a1ffe4169bdcb4cf6 
ceb8822ad1950f466a7fc19989319d97.vir.dll 88064  ceb8822ad1950f466a7fc19989319d97 
cb716c97b8689826541cd43f7930488b.vir.dll 213504  cb716c97b8689826541cd43f7930488b 
1c6c8d1b9b35d66a5088d3cc2326b100.dll 249663  1c6c8d1b9b35d66a5088d3cc2326b10009/08/2023
406e695429237fbc4ae8bd8371dc5b3e.vir.dll 205824  406e695429237fbc4ae8bd8371dc5b3e21/07/2023
ffb19d48300778dfaeea435c642e7d37.dll 88064  ffb19d48300778dfaeea435c642e7d3721/08/2020
a935a95495f35300006c134edc24b69e.dll 229888  a935a95495f35300006c134edc24b69e12/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware