Home / Spyware Encyclopedia / Rootkit.Podnuha.eg << Back

Recommendation to Automatically remove Rootkit.Podnuha.eg


Our products can remove Rootkit.Podnuha.eg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.eg Details


  • Category Rootkit
  • Discovered 5/17/2024 8:11:56 PM
  • Modified 5/20/2024 10:11:27 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
06c03f38.exe 111616  41b771ef6125e5fcb34fb11e908a801a 
rootkit.win32.podnuha.eg 111616  0a224613e5e79e04526fe53439d82cd6 
e41e2c556aa005c26cecbddfc1a27ef4.vxe.exe 140800  e41e2c556aa005c26cecbddfc1a27ef4 
411587ca631ede9e3a44fd4d734bb663.exe 111616  411587ca631ede9e3a44fd4d734bb663 
41c59284a3af78d919a9010563279209.exe 111616  41c59284a3af78d919a9010563279209 
4592e0054391cbeff2d2f734362315f8.exe 111616  4592e0054391cbeff2d2f734362315f8 
1d63798608c9b3f8fc5af54069201e96.exe 111616  1d63798608c9b3f8fc5af54069201e96 
79b536cbf7d76982a8d8fe5c37e296dc.exe 111616  79b536cbf7d76982a8d8fe5c37e296dc 
7bc74453399a1d79b1b849f693d42559.exe 111616  7bc74453399a1d79b1b849f693d42559 
e3e6f9652199d46162f1b65ce7ad8fce1b6c96a476e08dacac38b030ce674593.exe 111616  7e2c441737b0384d78bd7cbb763bbef1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware