Home / Spyware Encyclopedia / Rootkit.Podnuha.eg << Back

Recommendation to Automatically remove Rootkit.Podnuha.eg


Our products can remove Rootkit.Podnuha.eg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.eg Details


  • Category Rootkit
  • Discovered 11/4/2011 10:50:06 PM
  • Modified 8/11/2023 3:36:20 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
06c03f38.exe 111616  41b771ef6125e5fcb34fb11e908a801a 
rootkit.win32.podnuha.eg 111616  0a224613e5e79e04526fe53439d82cd6 
eee05be595510626de2332192be3f69d.exe 140800  eee05be595510626de2332192be3f69d 
411587ca631ede9e3a44fd4d734bb663.exe 111616  411587ca631ede9e3a44fd4d734bb663 
41c59284a3af78d919a9010563279209.exe 111616  41c59284a3af78d919a9010563279209 
4592e0054391cbeff2d2f734362315f8.exe 111616  4592e0054391cbeff2d2f734362315f8 
1d63798608c9b3f8fc5af54069201e96.exe 111616  1d63798608c9b3f8fc5af54069201e96 
41e7b0aa907e58a57653b5143b10f5751ea0e2039cdadec1ce84d046f985889f.exe 111616  1112dc99946b5beae752e454bef9c974 
e3e6f9652199d46162f1b65ce7ad8fce1b6c96a476e08dacac38b030ce674593.exe 111616  7e2c441737b0384d78bd7cbb763bbef1 
bdc9b04c278fbb9259d47966c1a0f3bdcbe962fb0bcda68fc463aa6698dc78c4.exe 111616  79817d83a08c5b3afd6298d635cdfdb4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware