Downloader.Small
Posted: July 24, 2009
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 9/10 |
|---|---|
| Infected PCs: | 91 |
| First Seen: | July 24, 2009 |
|---|---|
| Last Seen: | July 9, 2022 |
| OS(es) Affected: | Windows |
Aliases
Downloader.Rozena [AVG]W32/Downloader_x.FIS!tr [Fortinet]Trojan.Win32.Swrort [Ikarus]Downloader/Win32.Agent [AhnLab-V3]TrojanDownloader:Win32/Small.gen!C [Microsoft]TR/Dldr.Small.C.49 [AntiVir]Mal/Generic-S [Sophos]Trojan-Downloader.Win32.Agent.uekz [Kaspersky]Win32:Malware-gen [Avast]Trojan.ADH.2 [Symantec]W32/Malware!488d [F-Prot]Riskware ( 0015e4f11 ) [K7AntiVirus]Artemis!50FF8922C4AA [McAfee]TrojanDownloader.Small.c [CAT-QuickHeal]unknown virus Win32/DH{ICVXZ2IP} [AVG]
More aliases (1230)
More aliases (1230)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%USERPROFILE%\2cuc.exe
File name: 2cuc.exeSize: 167.93 KB (167936 bytes)
MD5: c94ab34868ec4624e1e7e95e234a48ed
Detection count: 94
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%
Group: Malware file
Last Updated: May 16, 2012
csrssc.exe
File name: csrssc.exeSize: 22.02 KB (22025 bytes)
MD5: 15b509797452669ab6fd27dcce119626
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 8, 2010
OlpSynch.exe
File name: OlpSynch.exeSize: 42.28 KB (42288 bytes)
MD5: aad4e9c4f0833218843eeb0f592d480f
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 9, 2022
svchost.exe
File name: svchost.exeSize: 45.74 KB (45740 bytes)
MD5: 247428e1d09ad34c0f0eb5f0efa40e87
Detection count: 74
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 21, 2010
%APPDATA%\3.exe
File name: 3.exeSize: 286.72 KB (286720 bytes)
MD5: f8e14bedb9320dc27fe5e5ab1fc4b28d
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: December 27, 2012
pluscashbagnet.exe
File name: pluscashbagnet.exeSize: 118.78 KB (118784 bytes)
MD5: 936e08e5902a1533571006dd6ff42003
Detection count: 60
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
scnxwromae.tmp
File name: scnxwromae.tmpSize: 23.58 KB (23587 bytes)
MD5: 463d9ad809840e72ab0d12e8487f8c6f
Detection count: 26
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
Last Updated: January 8, 2010
sysservice.exe
File name: sysservice.exeSize: 43.52 KB (43520 bytes)
MD5: 049ffa5e005b8486c809d90ffe6cc5a5
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 8, 2010
nSvcAppFlt.exe
File name: nSvcAppFlt.exeSize: 14.84 KB (14848 bytes)
MD5: 3d3f772902b7f65278423c0ae6c9a2f3
Detection count: 22
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
kpl9xir2r.exe
File name: kpl9xir2r.exeSize: 15 KB (15001 bytes)
MD5: 62686fd8a1c24abfb7a621e5629ce4ab
Detection count: 22
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 8, 2010
%PROGRAMFILES%\InstallShield Installation Information\meho.dll
File name: meho.dllSize: 11.26 KB (11264 bytes)
MD5: 1c0ebc3e9f76bc462ea8d4643abb9066
Detection count: 19
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES%\InstallShield Installation Information
Group: Malware file
Last Updated: December 1, 2010
Update.exe
File name: Update.exeSize: 13.31 KB (13312 bytes)
MD5: 2834fdc10633e5b40df38fdf0b3e45aa
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
ldcore.dll
File name: ldcore.dllSize: 7.71 KB (7713 bytes)
MD5: e6a42a8bfbe06a3ee91d67439f930e70
Detection count: 12
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
AutoUpdateWin31.dll
File name: AutoUpdateWin31.dllSize: 69.63 KB (69632 bytes)
MD5: 69c1cc1bae6bc7588db5f48225ad273a
Detection count: 10
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009
hlsetup2.exe
File name: hlsetup2.exeSize: 53.24 KB (53248 bytes)
MD5: 3fbb644f1374a2d53a8906844e77e52b
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 20, 2022
winfjt32.dll
File name: winfjt32.dllSize: 17.4 KB (17408 bytes)
MD5: 955883f0147e034b23cf5cff0d1a9c0b
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: July 29, 2011
spools.exe
File name: spools.exeSize: 20.99 KB (20992 bytes)
MD5: 3fd711d9e869cc1891d0455b7b05c338
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
%WINDIR%\system32\SetCrSr.exe
File name: SetCrSr.exeSize: 16.38 KB (16384 bytes)
MD5: 61aadec1216f61dad257b2fc656d4a6b
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: January 10, 2022
%WINDIR%\System32\config\systemprofile\AppData\Roaming\q8yu2x5m.exe
File name: q8yu2x5m.exeSize: 44.03 KB (44032 bytes)
MD5: 428cf20c1751393927d5d497478182f8
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\System32\config\systemprofile\AppData\Roaming
Group: Malware file
Last Updated: October 8, 2012
soundmix.exe
File name: soundmix.exeSize: 16.89 KB (16896 bytes)
MD5: 5d95ab03c152f1d7bee2aa8fc10a3236
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
a.exe
File name: a.exeSize: 60.41 KB (60416 bytes)
MD5: feccc568462b916d707f964c31ae823c
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
cftmon.exe
File name: cftmon.exeSize: 18.94 KB (18944 bytes)
MD5: 2fc8218ae7182bf3f011b2e90cebb9ff
Detection count: 1
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.