Home / Spyware Encyclopedia / Rootkit.Podnuha.ccc << Back

Recommendation to Automatically remove Rootkit.Podnuha.ccc


Our products can remove Rootkit.Podnuha.ccc and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.ccc Details


  • Category Rootkit
  • Discovered 10/5/2012 8:28:12 AM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b70f16e4.dll 97280Alcohol Soft Development Team3.0.0.02f7981e56b06a9ef9af6553bda11eb2e 
ef3a09d5c7681cc4710d66d498519513e560546cc7424283418f4e1b73a235c2.exe 124928  b1a2c10dac5866f4449d69e6bcee9324 
6f5f95bfdc67812ea79c8160e23f4493.vir.exe 124928  6f5f95bfdc67812ea79c8160e23f4493 
fe6f57deb301221110b920247dda5356.vir.exe 124928  fe6f57deb301221110b920247dda5356 
f00564ccf896f40b1b0946f04e37ed76.vir.exe 124928  f00564ccf896f40b1b0946f04e37ed76 
e30acf75ea6a12dfcb29704d4a5db366.vir.exe 124928  e30acf75ea6a12dfcb29704d4a5db366 
c43859c09975d686e9857a40e4501bd6.vir.exe 124928  c43859c09975d686e9857a40e4501bd6 
8a5a7110f048bce26e4faeb3cc2c8096.vir.exe 124928  8a5a7110f048bce26e4faeb3cc2c8096 
63e6f81ad700419b4ede7a92f8a0d7d6.vir.exe 124928  63e6f81ad700419b4ede7a92f8a0d7d6 
bc5babd2b0b8fa1769e0e3ec22331762.vir.exe 124928  bc5babd2b0b8fa1769e0e3ec22331762 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware