Home / Spyware Encyclopedia / Rootkit.Podnuha.eg << Back

Recommendation to Automatically remove Rootkit.Podnuha.eg


Our products can remove Rootkit.Podnuha.eg and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.eg Details


  • Category Rootkit
  • Discovered 5/17/2024 8:11:56 PM
  • Modified 5/20/2024 10:11:27 AM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
06c03f38.exe 111616  41b771ef6125e5fcb34fb11e908a801a 
rootkit.win32.podnuha.eg 111616  0a224613e5e79e04526fe53439d82cd6 
411587ca631ede9e3a44fd4d734bb663.exe 111616  411587ca631ede9e3a44fd4d734bb663 
41c59284a3af78d919a9010563279209.exe 111616  41c59284a3af78d919a9010563279209 
4592e0054391cbeff2d2f734362315f8.exe 111616  4592e0054391cbeff2d2f734362315f8 
1d63798608c9b3f8fc5af54069201e96.exe 111616  1d63798608c9b3f8fc5af54069201e96 
4291082e0329cbee11f31219c9b4022e.exe 111616  4291082e0329cbee11f31219c9b4022e 
bdc9b04c278fbb9259d47966c1a0f3bdcbe962fb0bcda68fc463aa6698dc78c4.exe 111616  79817d83a08c5b3afd6298d635cdfdb4 
30ba34487016d76f63e2a31c3ac6dfa67b56263a076a7a995037acf52b1c2934.exe 111616  48ffc0ad2dc10cde7a70480e34a5538e 
119985f4e676d61f5c3fa7b9520d8e5b5fc62f0854be661955ceff13d722a317.exe 111616  00892421c810c8afe9d0753b09817ed7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware