Home / Spyware Encyclopedia / Rootkit.Podnuha.y << Back

Recommendation to Automatically remove Rootkit.Podnuha.y


Our products can remove Rootkit.Podnuha.y and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.y Details


  • Category Rootkit
  • Discovered 4/2/2024 10:38:32 PM
  • Modified 4/3/2024 11:31:33 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d3dr.dll 83968  4a0c33cb2c864d90e20e8f0b8aaafd53 
82bb054d.dll 84480  48ebf6177c8f65f0928ac7efb476a076 
cabine.dll 84480  b56d3f952ed260f563f0099b1875095b 
292f3dd82d1e54c48ba3f0768cd46e511b1b19e73f56f1a8f63571815d578492_at.dll.exe.dll 84992  d460e6a3521d1dba4541fe5f1cd9d158 
ef2537104062cbb917aaae5aa231264f.dll 107264  ef2537104062cbb917aaae5aa231264f 
61808df05e3f15760bfeaaa83e0364b2.dll 91392  61808df05e3f15760bfeaaa83e0364b2 
9a5e6362bd0ae630b5cb1fdd3d284950.dll 108288  9a5e6362bd0ae630b5cb1fdd3d284950 
6a709fc4462717a1f057eca030d20c10.dll 88576  6a709fc4462717a1f057eca030d20c10 
d3e7b590a02910732371508013a29529.dll 100096  d3e7b590a02910732371508013a29529 
85c37d7f3510fb68c370429a4e9ca94c.dll 88320  85c37d7f3510fb68c370429a4e9ca94c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware