Home / Spyware Encyclopedia / Rootkit.Podnuha.z << Back

Recommendation to Automatically remove Rootkit.Podnuha.z


Our products can remove Rootkit.Podnuha.z and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.z Details


  • Category Rootkit
  • Discovered 3/3/2024 5:23:29 PM
  • Modified 3/4/2024 10:11:20 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f9029b986af2ef484a31f14a0a8f85a4.dll 237568  f9029b986af2ef484a31f14a0a8f85a4 
52ef2e4638f385cfb1395c1e52c6bc5a181be416c81eba69699eafffd1dc2f1b.dll 200704  0877bac1a6cca2282be6642cfc6da1ab 
3848b908532f1993bc1808b1183b722c.vir.dll 145983  3848b908532f1993bc1808b1183b722c 
d92bea549507cd09672bfe1e5e828afb.vir.dll 241586  d92bea549507cd09672bfe1e5e828afb 
43db733393189cae94fb1097d5c00c4f.vir.dll 241586  43db733393189cae94fb1097d5c00c4f 
49cd049ea2988cb2e7f241e205ae4fcd.vir.dll 241586  49cd049ea2988cb2e7f241e205ae4fcd 
059a369942c9a0e70f5e07e500867d63.vir.dll 90112  059a369942c9a0e70f5e07e500867d63 
4e5f976106354a4947e3872848bd6a82.vir.dll 90624  4e5f976106354a4947e3872848bd6a82 
190dc464c4b44ad17d8cd6d6289604a3.vir.dll 200704  190dc464c4b44ad17d8cd6d6289604a3 
0192303_000237568-6a5aeffe_92574d87cac8413f422b4fd1e4e7f9f4.dll 237568  92574d87cac8413f422b4fd1e4e7f9f419/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware