Adware.Crossid
Posted: September 10, 2012
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 9,050 |
First Seen: | September 10, 2012 |
---|---|
Last Seen: | July 16, 2020 |
OS(es) Affected: | Windows |
Aliases
Adware/Agent.494424.40 [AntiVir]Artemis!7BD00CCDC0E4 [McAfee]Adware/Fam.NB [Fortinet]Adware/Agent.494424.31 [AntiVir]Gen:Variant.Adware.VidSaver.1 [BitDefender]Artemis!EBE97DBEBEC9 [McAfee]AdWare.Agent [Ikarus]Adware.Plugin.24 [DrWeb]W32/Palevo.GJRZ!worm.p2p [Fortinet]Adware/Agent.494424.49 [AntiVir]Artemis!D51C16586A34 [McAfee]W32/Toolbar.CROSSRIDER!tr [Fortinet]Adware/Agent.494424.20 [AntiVir]Artemis!1330B0E23B4D [McAfee]AdWare.SuspectCRC [Ikarus]
More aliases (74)
More aliases (74)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%PROGRAMFILES%\Premiumplay Codec-C\Premiumplay Codec-C.dll
File name: Premiumplay Codec-C.dllSize: 463.87 KB (463872 bytes)
MD5: 9dab84595adf8e07c7d0fc0a133f08b3
Detection count: 2,143
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\Premiumplay Codec-C
Group: Malware file
Last Updated: October 25, 2021
%PROGRAMFILES%\Adult Website Filter\Adult Website Filter.dll
File name: Adult Website Filter.dllSize: 484.86 KB (484864 bytes)
MD5: 640d5eb884b6236401ce23c6911a1b49
Detection count: 68
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\Adult Website Filter
Group: Malware file
Last Updated: October 25, 2012
C:\Program Files\I Want This\I Want This.dll
File name: I Want This.dllSize: 493.44 KB (493440 bytes)
MD5: 7619de1fb91ef19d3f2df94bf0f2eb23
Detection count: 49
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\Program Files\I Want This\I Want This.dll
Group: Malware file
Last Updated: June 5, 2023
%PROGRAMFILES(x86)%\i want this\i want this.exe
File name: i want this.exeSize: 441.21 KB (441216 bytes)
MD5: f7e5be6d5415c43ebb54989c79969671
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\i want this
Group: Malware file
Last Updated: January 8, 2013
C:\Users\<username>\Downloads\backups\backup-20130509-173700-503.dll
File name: backup-20130509-173700-503.dllSize: 493.44 KB (493440 bytes)
MD5: 7bd00ccdc0e4093283f9373a96defdf4
Detection count: 35
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\Users\<username>\Downloads\backups\backup-20130509-173700-503.dll
Group: Malware file
Last Updated: October 13, 2021
%PROGRAMFILES%\Giant Savings\Giant Savings.dll
File name: Giant Savings.dllSize: 488.84 KB (488840 bytes)
MD5: 6042f8388795fbe26d05d7c2d271c838
Detection count: 28
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\Giant Savings
Group: Malware file
Last Updated: May 2, 2013
%PROGRAMFILES%\Giant Savings\Giant Savings.dll
File name: Giant Savings.dllSize: 572.8 KB (572808 bytes)
MD5: dd6532a868570f5bfcc1719768bca250
Detection count: 23
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\Giant Savings
Group: Malware file
Last Updated: January 21, 2013
%PROGRAMFILES(x86)%\giant savings\giant savings.exe
File name: giant savings.exeSize: 441.72 KB (441728 bytes)
MD5: ef4e0be0fad7790d8191420bceefdb97
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\giant savings
Group: Malware file
Last Updated: March 4, 2013
%PROGRAMFILES%\I Want This\I Want This.dll
File name: I Want This.dllSize: 493.44 KB (493440 bytes)
MD5: 1be3df4fb30b8f2d00a54a17d7dd3416
Detection count: 14
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\I Want This
Group: Malware file
Last Updated: January 17, 2020
%PROGRAMFILES%\Vid-Saver\Vid-Saver.dll
File name: Vid-Saver.dllSize: 488.83 KB (488832 bytes)
MD5: 70ce1581768ac5f3feca78e6789e56f4
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\Vid-Saver
Group: Malware file
Last Updated: May 8, 2013
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.