Home / Spyware Encyclopedia / Rootkit.Podnuha.dl << Back

Recommendation to Automatically remove Rootkit.Podnuha.dl


Our products can remove Rootkit.Podnuha.dl and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.dl Details


  • Category Rootkit
  • Discovered 3/31/2011 10:57:06 AM
  • Modified 1/2/2024 10:34:47 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c3077564c01f0c1d15777fa851b66561.dll 88064  c3077564c01f0c1d15777fa851b66561 
0452726_000140800-FA49274A_d34274800bff8ffdb1146c4393efe098.EXE 0  d34274800bff8ffdb1146c4393efe09809/08/2023
EEB4B976.EXE 140800  4037a59394870c4dd38c616d3d0af00b12/12/2020
3bf9ee0529cb87ffdc8f198b993b1b9f.vir.dll 88064  3bf9ee0529cb87ffdc8f198b993b1b9f 
9a41ce03b8fc17dfc2a18cabf72e2956.vir.dll 88064  9a41ce03b8fc17dfc2a18cabf72e2956 
b80067188187f12e68ebb81eee48cb9e49368377bb358a2c8c54da7a586b0a1a.dll 88576  747f748f3ec5bf6a85a17135caf273cb 
2cef7584f3f7f92a113503f25efedb4561b1a433a696e0e6f22b8d632266511f.exe 140800  4b9c6cea7eb30acaaaacbc7a9c3846f1 
p000499_000111616-5483dead_0e69241d3b2e4e769fe545a1e7978e36.exe 111616  0e69241d3b2e4e769fe545a1e7978e36 
5579f06f.exe 111616  0b58d7ed5604f54515787dcfe54a749e 
a08f82c2.exe 111616  0bc0d78e636238ce9154d78c9906cb09 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware