Home / Spyware Encyclopedia / Rootkit.Podnuha.ac << Back

Recommendation to Automatically remove Rootkit.Podnuha.ac


Our products can remove Rootkit.Podnuha.ac and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.ac Details


  • Category Rootkit
  • Discovered 5/9/2016 7:35:38 PM
  • Modified 7/24/2023 3:09:20 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
51b305dba13e9a6c37c7279ec944cd03.dll 204032  51b305dba13e9a6c37c7279ec944cd03 
bc3930297b276562f7b3559702b3beaedfd82f533c97d96ae8220ffce4da7cda.dll 220672  21c3a81ba2fba42bb858975fb653cc0a 
b09b1471fd981047b339bd3ae18b8cd0.vir.dll 200704  b09b1471fd981047b339bd3ae18b8cd0 
b152b2d0c8ac28af144807dd12f73c4a.vir.dll 221440  b152b2d0c8ac28af144807dd12f73c4a 
56a3bfe40aae7e3b1d179e4174227557.vir.dll 215808  56a3bfe40aae7e3b1d179e4174227557 
d325cf02234d2884767adb4dee55b95a.vir.dll 215040  d325cf02234d2884767adb4dee55b95a 
066209f0b2c83e80030bd0644e3e6610.vir.dll 217600  066209f0b2c83e80030bd0644e3e6610 
75b29584db906f59f9b5dba6c69e27f4.vir.dll 207872  75b29584db906f59f9b5dba6c69e27f421/07/2023
9bce7075baa9201837eed445450687a0.vir.dll 222720  9bce7075baa9201837eed445450687a021/07/2023
64b104dfece0a05dceff6bcd25ceb976.vir.dll 211968  64b104dfece0a05dceff6bcd25ceb97621/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware