Backdoor.Pontoeb Description
Backdoor.Pontoeb is a dangerous backdoor Trojan that may find its way onto a computer through a backdoor vulnerability. Once installed, Backdoor.Pontoeb will load at startup of Windows where it may connect to a remote source. Remove attackers may have access to an infected system through Backdoor.Pontoeb which puts stored data at risk of being stolen. Furthermore, Backdoor.Pontoeb is known to hide amongst different executable files throughout a system's hard drive. The download of other unknown malware may occur once Backdoor.Pontoeb has connected to a remote source. It is very important to remove Backdoor.Pontoeb so it is not able to cause destruction through remove connections.
Technical Information
File System Details
Backdoor.Pontoeb creates the following file(s):
# | File Name | Size | MD5 |
---|---|---|---|
1 | crstk.exe | ||
2 | uodbs.dll | ||
3 | Oik6C8D0B8D.sys | ||
4 | inlisw32.dll | ||
5 | ctfmonipa.exe | ||
6 | commctl32.dll | ||
7 | verupd.exe | ||
8 | wb.exe | ||
9 | WUDHost.exe | ||
10 | dwm.exe | ||
11 | pstc.exe | ||
12 | uTorent.exe | ||
13 | systemup.exe | ||
14 | mkqiq.exe | ||
15 | ctfmonqdd.exe | ||
16 | Counter-Strike Source.exe | ||
17 | 9719831.exe | ||
18 | inetsw32.dll | ||
19 | Windows.exe | ||
20 | win32rundll.exe | ||
21 | waudiohd.exe | ||
22 | unupx.dll | ||
23 | wtsx.exe | ||
24 | taskhostt.exe | ||
25 | netbt.sys | ||
26 | deep_freeze_standard_6_2.exe | ||
27 | CR-WR311.EXE | ||
28 | AppleMainInit.dll | ||
29 | onetsw32.dll | ||
30 | system.exe | ||
31 | svchost.exe | ||
32 | audiohd.exe | ||
33 | The_Lost_Watch_3D_Screensaver.scr | ||
34 | Builded.exe | 28,160 | 91768143d6c9909c3d36508a495263c8 |
Site Disclaimer
Enigmasoftware.com is not associated, affiliated, sponsored or owned
by the malware creators or distributors mentioned on this article. This article should NOT be
mistaken or confused in being associated in any way with the promotion or endorsement of malware.
Our intent is to provide information that will educate computer users on how to detect, and ultimately
remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on
this article.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.