Trojan.Sirefef.gen!E
Posted: March 1, 2013
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 1,843 |
First Seen: | March 1, 2013 |
---|---|
Last Seen: | June 12, 2019 |
OS(es) Affected: | Windows |
Aliases
BackDoor.Generic16.CGAX [AVG]W32/ZAccess.BSDF!tr.bdr [Fortinet]TR/Symmi.15280.2 [AntiVir]Backdoor.Win32.ZAccess.bsdf [Kaspersky]Suspicious.Cloud [Symantec]Riskware [K7AntiVirus]RDN/Generic BackDoor!hp [McAfee]Generic_s.AJB [AVG]BackDoor.Generic16.CGYD [AVG]W32/ZAccess.BSHE!tr.bdr [Fortinet]Win32.SuspectCrc [Ikarus]Backdoor/Win32.PMax [AhnLab-V3]TR/Symmi.15280.3 [AntiVir]Backdoor.Win32.ZAccess.bshe [Kaspersky]ZeroAccess-FBJR!B8E3C949FD1A [McAfee]
More aliases (373)
More aliases (373)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SystemDrive%\RECYCLER\S-1-5-21-79648727-29085268-1679463437-500\$3df0b16ca43a09989463df582977439a\n.
File name: n.Size: 68.6 KB (68608 bytes)
MD5: 90bc3feef48a8dbb79b999a34fe44b8a
Detection count: 94
Path: %SystemDrive%\RECYCLER\S-1-5-21-79648727-29085268-1679463437-500\$3df0b16ca43a09989463df582977439a
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-386763123-3053948414-3655255902-500\$3beeb229e6c27910168da30b6430fb86\n.
File name: n.Size: 69.63 KB (69632 bytes)
MD5: 2fe1ce150c39a0e1f0eb4d0550fd2992
Detection count: 92
Path: %SystemDrive%\RECYCLER\S-1-5-21-386763123-3053948414-3655255902-500\$3beeb229e6c27910168da30b6430fb86
Group: Malware file
Last Updated: May 15, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1292428093-682003330-725345543-1003\$f2f72cf11f9e4e05363e02994c826b33\n.
File name: n.Size: 58.88 KB (58880 bytes)
MD5: c5203df753d64fdb6f9850a7f7dc255d
Detection count: 89
Path: %SystemDrive%\RECYCLER\S-1-5-21-1292428093-682003330-725345543-1003\$f2f72cf11f9e4e05363e02994c826b33
Group: Malware file
Last Updated: April 8, 2013
%SystemDrive%\RECYCLER\S-1-5-21-299502267-764733703-1644491937-1004\$1a0534a9e20345539e70b45d60944802\n.
File name: n.Size: 58.88 KB (58880 bytes)
MD5: 2b646958488bb56da541552463a470ac
Detection count: 82
Path: %SystemDrive%\RECYCLER\S-1-5-21-299502267-764733703-1644491937-1004\$1a0534a9e20345539e70b45d60944802
Group: Malware file
Last Updated: April 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1177238915-1844823847-1417001333-1003\$d1a49b3d45bc3f844a24b219c85ea478\n.
File name: n.Size: 61.95 KB (61952 bytes)
MD5: b1476479315b76a3787945e951f74010
Detection count: 80
Path: %SystemDrive%\RECYCLER\S-1-5-21-1177238915-1844823847-1417001333-1003\$d1a49b3d45bc3f844a24b219c85ea478
Group: Malware file
Last Updated: April 17, 2013
%SystemDrive%\RECYCLER\S-1-5-21-689538234-3439628150-1428692504-1007\$f0c2cef4d0e3ab8dbee69e3fdbf5df0c\n.
File name: n.Size: 69.12 KB (69120 bytes)
MD5: b8e3c949fd1a61029131269fa3d8ee3b
Detection count: 71
Path: %SystemDrive%\RECYCLER\S-1-5-21-689538234-3439628150-1428692504-1007\$f0c2cef4d0e3ab8dbee69e3fdbf5df0c
Group: Malware file
Last Updated: May 13, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1390067357-813497703-725345543-1012\$3e14b101256c94d58dec4c9728e56949\n.
File name: n.Size: 68.6 KB (68608 bytes)
MD5: c4605c0539ff44e7bb8bb9bbe35f1a0a
Detection count: 68
Path: %SystemDrive%\RECYCLER\S-1-5-21-1390067357-813497703-725345543-1012\$3e14b101256c94d58dec4c9728e56949
Group: Malware file
Last Updated: March 21, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1214440339-682003330-725345543-1003\$c2da8ef1cde2523d2677edc4de445b40\n.
File name: n.Size: 62.97 KB (62976 bytes)
MD5: 7d479d63cb5002a02c00da54f00cd5ea
Detection count: 59
Path: %SystemDrive%\RECYCLER\S-1-5-21-1214440339-682003330-725345543-1003\$c2da8ef1cde2523d2677edc4de445b40
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-3069405725-730759366-1872035813-1005\$b99a58bf7283f86546ab4f6094af3b74\n.
File name: n.Size: 68.09 KB (68096 bytes)
MD5: 59f6c1279ad3cb698ef97a8604b64698
Detection count: 40
Path: %SystemDrive%\RECYCLER\S-1-5-21-3069405725-730759366-1872035813-1005\$b99a58bf7283f86546ab4f6094af3b74
Group: Malware file
Last Updated: March 21, 2013
%SystemDrive%\RECYCLER\S-1-5-21-2405740930-1667423437-637334377-1137\$b030c43c9f0ab75925f19892e18e1f33\n.
File name: n.Size: 62.46 KB (62464 bytes)
MD5: 3b9e16c4b65c19226e7b0433420b5a49
Detection count: 40
Path: %SystemDrive%\RECYCLER\S-1-5-21-2405740930-1667423437-637334377-1137\$b030c43c9f0ab75925f19892e18e1f33
Group: Malware file
Last Updated: March 21, 2013
%SystemDrive%\RECYCLER\S-1-5-21-481238014-3223466485-1350116940-500\$ff24043d55f85ce9a20a8337d9b4b888\n.
File name: n.Size: 62.97 KB (62976 bytes)
MD5: 74d51b0e7f377d93025d7c6fbd15a820
Detection count: 37
Path: %SystemDrive%\RECYCLER\S-1-5-21-481238014-3223466485-1350116940-500\$ff24043d55f85ce9a20a8337d9b4b888
Group: Malware file
Last Updated: April 22, 2013
%SystemDrive%\RECYCLER\S-1-5-21-2789745080-674849514-1741635063-1005\$e9b286b0d2913402ea32905de3855b5d\n.
File name: n.Size: 65.53 KB (65536 bytes)
MD5: fb04cf3ca18ceaa12b4fac7beeb152d5
Detection count: 35
Path: %SystemDrive%\RECYCLER\S-1-5-21-2789745080-674849514-1741635063-1005\$e9b286b0d2913402ea32905de3855b5d
Group: Malware file
Last Updated: March 12, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1202660629-1637723038-1177238915-1003\$aeaef474d35d47f9ed60eb86d7e5b61e\n.
File name: n.Size: 63.48 KB (63488 bytes)
MD5: 065314ba711f406f3e52a18ccb3fa543
Detection count: 35
Path: %SystemDrive%\RECYCLER\S-1-5-21-1202660629-1637723038-1177238915-1003\$aeaef474d35d47f9ed60eb86d7e5b61e
Group: Malware file
Last Updated: April 8, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1085031214-1390067357-839522115-1004\$15cc91c519b221dbf0eff9fae966f351\n.
File name: n.Size: 69.12 KB (69120 bytes)
MD5: 111280dd0457d706c37ecb3371f420d3
Detection count: 33
Path: %SystemDrive%\RECYCLER\S-1-5-21-1085031214-1390067357-839522115-1004\$15cc91c519b221dbf0eff9fae966f351
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-3423678246-3527796972-622417628-1006\$2339622371267424fa03fe9b9d8dab9f\n.
File name: n.Size: 63.48 KB (63488 bytes)
MD5: fa3abaf979d2df59d53f4fd2960c4257
Detection count: 33
Path: %SystemDrive%\RECYCLER\S-1-5-21-3423678246-3527796972-622417628-1006\$2339622371267424fa03fe9b9d8dab9f
Group: Malware file
Last Updated: April 8, 2013
%SystemDrive%\RECYCLER\S-1-5-21-2070838540-1988503616-794563710-14400\$e6772c78074b82bc7c093a0091a9fb3b\n.
File name: n.Size: 68.09 KB (68096 bytes)
MD5: 333da829b62050322ae4c5c2cba4675c
Detection count: 30
Path: %SystemDrive%\RECYCLER\S-1-5-21-2070838540-1988503616-794563710-14400\$e6772c78074b82bc7c093a0091a9fb3b
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-2687697215-2471928570-1459108826-1107\$adabd0f39ded4bad14372ab0e2ea7041\n.
File name: n.Size: 62.97 KB (62976 bytes)
MD5: 1efbd85c86c9d2240ef5a1b45ed14432
Detection count: 23
Path: %SystemDrive%\RECYCLER\S-1-5-21-2687697215-2471928570-1459108826-1107\$adabd0f39ded4bad14372ab0e2ea7041
Group: Malware file
Last Updated: April 8, 2013
%SystemDrive%\RECYCLER\S-1-5-21-694131814-1410303872-3471990682-1011\$a70c95c4445d2ee137c7c000d5ae3824\n.
File name: n.Size: 69.12 KB (69120 bytes)
MD5: e6fd0aa86d4c924eb394da372bacf014
Detection count: 21
Path: %SystemDrive%\RECYCLER\S-1-5-21-694131814-1410303872-3471990682-1011\$a70c95c4445d2ee137c7c000d5ae3824
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1085031214-1214440339-839522115-1003\$3a63d4b22e148f4e67cd77f3c70b00eb\n.
File name: n.Size: 66.04 KB (66048 bytes)
MD5: d4704ba64a633c8c2c1083488e2a2250
Detection count: 16
Path: %SystemDrive%\RECYCLER\S-1-5-21-1085031214-1214440339-839522115-1003\$3a63d4b22e148f4e67cd77f3c70b00eb
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\RECYCLER\S-1-5-21-1390067357-1500820517-1801674531-1003\$cd69fbfc81a756d74705b9a43689c10d\n.
File name: n.Size: 63.48 KB (63488 bytes)
MD5: a23d9bf6c0ff55e5796d944442d5cf3b
Detection count: 7
Path: %SystemDrive%\RECYCLER\S-1-5-21-1390067357-1500820517-1801674531-1003\$cd69fbfc81a756d74705b9a43689c10d
Group: Malware file
Last Updated: March 29, 2013
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.