Dursg.E
Posted: October 12, 2010
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 5,947 |
| First Seen: | October 12, 2010 |
|---|---|
| Last Seen: | February 22, 2024 |
| OS(es) Affected: | Windows |
Aliases
Generic20.AEJH [AVG]Trojan/Win32.BHO.gen [Antiy-AVL]TR/BHO.azcc [AntiVir]Trojan.Win32.BHO.azcc [Kaspersky]W32/MalwareF.UGEK [F-Prot]Generic.dx!vga [McAfee]Trojan.BHO.azcc [CAT-QuickHeal]TR/Dursg.E.130 [AntiVir]Generic19.LZA [AVG]Generic.dx!tvh [McAfee]Trojan.Swisyn.alkt [CAT-QuickHeal]Generic21.ARFR [AVG]W32/PackKatusha.N!tr [Fortinet]Win-Trojan/Searches.1424384 [AhnLab-V3]Mal/Katush-B [Sophos]
More aliases (670)
More aliases (670)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:F:\New Folder (3)\rescue\documents\Downloads\A.A.9.P.E.T\A.A.9.P.E.T\t00lKiT\Patch\Patch.exe
File name: Patch.exeSize: 308.73 KB (308736 bytes)
MD5: ef73bf63c0b0d43b7491c4873f6018bf
Detection count: 2,544
File type: Executable File
Mime Type: unknown/exe
Path: F:\New Folder (3)\rescue\documents\Downloads\A.A.9.P.E.T\A.A.9.P.E.T\t00lKiT\Patch\Patch.exe
Group: Malware file
Last Updated: January 6, 2025
C:\Users\<username>\Downloads\Compressed\RamCleaner.v7.1 [yasdl.com]\ramcleaner[yasdl.com].exe
File name: ramcleaner[yasdl.com].exeSize: 1.37 MB (1375814 bytes)
MD5: 9d8689e4f1e605a0cdf0d3cc0aeef336
Detection count: 98
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\Downloads\Compressed\RamCleaner.v7.1 [yasdl.com]\ramcleaner[yasdl.com].exe
Group: Malware file
Last Updated: February 3, 2025
%WINDIR%\system32\esent9732.exe
File name: esent9732.exeSize: 1.33 MB (1338880 bytes)
MD5: d4eeb0d3ca3f03b6847d4f7099376544
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: November 30, 2010
%WINDIR%\system32\plustab32.exe
File name: plustab32.exeSize: 1.41 MB (1411584 bytes)
MD5: 2c2e7af256e3b294bf3cee125132a971
Detection count: 54
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 10, 2010
%USERPROFILE%\local settings\application data\rwbfkvs.exe
File name: rwbfkvs.exeSize: 499.71 KB (499712 bytes)
MD5: b14a5ca1e8b5e55afa986e05f620fb3f
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\local settings\application data
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\authfwcfg32.exe
File name: authfwcfg32.exeSize: 1.1 MB (1105920 bytes)
MD5: 89e66bb65df342ba2d781e69ca7b6c7b
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: November 30, 2010
%WINDIR%\system32\drttransport32.exe
File name: drttransport32.exeSize: 1.34 MB (1345536 bytes)
MD5: 491f8fd7199fdb2c8e4afd38ad183901
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: November 30, 2010
%WINDIR%\system32\deskadp32.dll
File name: deskadp32.dllSize: 139.77 KB (139776 bytes)
MD5: 0a4f785cb3ea97632ed59b61ce070062
Detection count: 22
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 4, 2011
%WINDIR%\system32\dot3gpui32.exe
File name: dot3gpui32.exeSize: 1.09 MB (1096704 bytes)
MD5: ec7fb00732cba86294514e56d4771c60
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 1, 2010
C:\Users\<username>\AppData\Local\Temp\changeb.exe
File name: changeb.exeSize: 61.49 KB (61490 bytes)
MD5: 440fb7a8938b27b271fea865c6c76bb9
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\changeb.exe
Group: Malware file
Last Updated: March 21, 2022
%WINDIR%\system32\cmsetacl32.exe
File name: cmsetacl32.exeSize: 1.31 MB (1312768 bytes)
MD5: e471695ec3c2f3ae7b6a38eac26b114f
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 9, 2010
%WINDIR%\system32\bthci32.exe
File name: bthci32.exeSize: 1.34 MB (1344000 bytes)
MD5: 15b46d00a5317c688d8890297e81e81d
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: November 30, 2010
D:\JD\ASH1\Ashampoo Home Designer 1.0.0\ashampkeygen.exe
File name: ashampkeygen.exeSize: 365.05 KB (365056 bytes)
MD5: caf26d2863acf9c7bc566b40854fb6b2
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: D:\JD\ASH1\Ashampoo Home Designer 1.0.0
Group: Malware file
Last Updated: February 20, 2020
%APPDATA%\SysWin\lsass.exe
File name: lsass.exeSize: 210.94 KB (210944 bytes)
MD5: 25233eee2cc7984f9b3be2cb2ca98f48
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\SysWin
Group: Malware file
Last Updated: May 16, 2011
%WINDIR%\system32\wmpmde32.exe
File name: wmpmde32.exeSize: 1.39 MB (1395712 bytes)
MD5: 6251efd7fcfa1234dc62f222a65185eb
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: May 16, 2011
%WINDIR%\SysWOW64\atioglxx32.exe
File name: atioglxx32.exeSize: 1.42 MB (1424384 bytes)
MD5: 116978eab490b5516aaedd7fa2b60092
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\SysWOW64
Group: Malware file
Last Updated: June 28, 2011
C:\Documents and Settings\<username>\Local Settings\Temp\19.tmp
File name: 19.tmpSize: 135.16 KB (135168 bytes)
MD5: a5e4c85de1a3e1db1f90a2b7aee2a46d
Detection count: 5
File type: Temporary File
Mime Type: unknown/tmp
Path: C:\Documents and Settings\<username>\Local Settings\Temp\19.tmp
Group: Malware file
Last Updated: May 30, 2021
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.