Home / Spyware Encyclopedia / Rootkit.Podnuha.ac << Back

Recommendation to Automatically remove Rootkit.Podnuha.ac


Our products can remove Rootkit.Podnuha.ac and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.ac Details


  • Category Rootkit
  • Discovered 5/9/2016 7:35:38 PM
  • Modified 7/24/2023 3:09:20 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bc3930297b276562f7b3559702b3beaedfd82f533c97d96ae8220ffce4da7cda.dll 220672  21c3a81ba2fba42bb858975fb653cc0a 
58b37ea7a06e1a563ad829e32be24a91.vir.dll 218624  58b37ea7a06e1a563ad829e32be24a91 
64b104dfece0a05dceff6bcd25ceb976.vir.dll 211968  64b104dfece0a05dceff6bcd25ceb97621/07/2023
9bce7075baa9201837eed445450687a0.vir.dll 222720  9bce7075baa9201837eed445450687a021/07/2023
75b29584db906f59f9b5dba6c69e27f4.vir.dll 207872  75b29584db906f59f9b5dba6c69e27f421/07/2023
066209f0b2c83e80030bd0644e3e6610.vir.dll 217600  066209f0b2c83e80030bd0644e3e6610 
6e6a7d8f2b125104a3c0125dcf03a803.vir.dll 215296  6e6a7d8f2b125104a3c0125dcf03a803 
d325cf02234d2884767adb4dee55b95a.vir.dll 215040  d325cf02234d2884767adb4dee55b95a 
8674b1bc1aa0e2f66906f67c98746cd8.vir.dll 217088  8674b1bc1aa0e2f66906f67c98746cd8 
56a3bfe40aae7e3b1d179e4174227557.vir.dll 215808  56a3bfe40aae7e3b1d179e4174227557 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware