Home / Spyware Encyclopedia / Rootkit.Podnuha.byd << Back

Recommendation to Automatically remove Rootkit.Podnuha.byd


Our products can remove Rootkit.Podnuha.byd and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Podnuha.byd Details


  • Category Rootkit
  • Discovered 5/18/2016 3:44:05 AM
  • Modified 7/24/2023 3:09:06 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e40c783cbc48248e8d421148985f1c4c.vir.exe 128000  5e908447c7e9a4eda4fcdbcee7294f50 
91b911fff10b30362ebdfcdd85d95c82.exe 147456  91b911fff10b30362ebdfcdd85d95c82 
6359cecc64bc2ee03f247142665ead7d.vir.exe 221184  6359cecc64bc2ee03f247142665ead7d21/07/2023
6359cecc64bc2ee03f247142665ead7d.vir.exe 221184  6359cecc64bc2ee03f247142665ead7d 
ab90ea0edbdf26fe8a4455ede9b14340.vir.exe 147456  ab90ea0edbdf26fe8a4455ede9b14340 
c3feb1f937c06ed95b44743043888e1c.vir.exe 154624  c3feb1f937c06ed95b44743043888e1c 
f530dc009626b817ee82584a208b36183b8529eadf87c77e2f51d64863118c41.exe 128000  405abbba9b4c931467ac5f87ed879024 
4d5bd38f52ef0633877d5af472eca08c.exe 128000  f848d8f1aad3708aa08b9a01d40027d7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware