Rootkit.Podnuha
Posted: July 24, 2009
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 6/10 |
---|---|
Infected PCs: | 5 |
First Seen: | July 24, 2009 |
---|---|
Last Seen: | September 30, 2022 |
OS(es) Affected: | Windows |
Aliases
TROJ_PODNUHA.AQ [TrendMicro]Rootkit [Sunbelt]High Risk System Back Door [Prevx1]Rootkit/WUpd.H [Panda]Rootkit.Win32.Podnuha.bhm [K7AntiVirus]Virus.Win32.Podnuha [Ikarus]Rootkit.Win32.Podnuha.byb [F-Secure]Trojan.Siggen.644 [DrWeb]TrojWare.Win32.Rootkit.Podnuha.~L [Comodo]Rootkit.Podnuha.bhm [CAT-QuickHeal]Rootkit.8593 [BitDefender]BackDoor.Generic10.YVB [AVG]Win-Trojan/Podnuha.120576 [AhnLab-V3]Virus.Win32.Podnuha!IK [a-squared]Fraudulent Security Program [Prevx1]
More aliases (179)
More aliases (179)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:cdmode.dll
File name: cdmode.dllSize: 96.76 KB (96768 bytes)
MD5: f348447d05f20f8a8b270b3f1f6cd7b7
Detection count: 93
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
CNMLM8.dll
File name: CNMLM8.dllSize: 88.06 KB (88064 bytes)
MD5: bfbc1aaafd02f2f711846cd8cc7a0565
Detection count: 85
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
auth.dll
File name: auth.dllSize: 96.25 KB (96256 bytes)
MD5: 93b8d62a0f9f39e021b83a0f1e337d90
Detection count: 74
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
cfgmgr3.dll
File name: cfgmgr3.dllSize: 95.74 KB (95744 bytes)
MD5: 2a9f7f83e01e333f716fcb3fb4a32dd5
Detection count: 61
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
apcupsw.dll
File name: apcupsw.dllSize: 120.57 KB (120576 bytes)
MD5: e49fe78482db87dfaace7735ab77628f
Detection count: 56
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
actxprx.dll
File name: actxprx.dllSize: 88.57 KB (88576 bytes)
MD5: 2d48e9736d5af5c147043bf41e8125a1
Detection count: 54
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
audiode.dll
File name: audiode.dllSize: 97.79 KB (97792 bytes)
MD5: db570c7d25c4bbc36bed4add95d8e579
Detection count: 46
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
kbdnep.dll
File name: kbdnep.dllSize: 88.06 KB (88064 bytes)
MD5: ae40336d4cc2febdcbd0ebb9f2f1db82
Detection count: 44
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
dmconfigb.dll
File name: dmconfigb.dllSize: 99.84 KB (99840 bytes)
MD5: d3467c20ad660db2c6669d20253ed7dc
Detection count: 36
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
bat.dll
File name: bat.dllSize: 88.57 KB (88576 bytes)
MD5: 84d2290ee36f8270a7249164cb3cd582
Detection count: 35
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
cfgbken.dll
File name: cfgbken.dllSize: 96.25 KB (96256 bytes)
MD5: 784d71d494726c7957a05995d94b05c2
Detection count: 35
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
C:\Windows\system32\qolog.dll
File name: qolog.dllSize: 95.74 KB (95744 bytes)
MD5: 56aa574e304d696255572d3bfaef5cb9
Detection count: 25
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\Windows\system32\qolog.dll
Group: Malware file
Last Updated: September 30, 2022
auth.dll
File name: auth.dllSize: 95.74 KB (95744 bytes)
MD5: 2e2d74faba889b0a8e8499cee9f1103a
Detection count: 21
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
avifil.dll
File name: avifil.dllSize: 97.79 KB (97792 bytes)
MD5: 236581095a62758897e5856b3c4f9293
Detection count: 20
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.