PUP.AppForWinDownloads
Posted: November 16, 2022
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 1/10 |
---|---|
Infected PCs: | 10 |
First Seen: | November 16, 2022 |
---|---|
OS(es) Affected: | Windows |
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:cocoon.g5255.exe
File name: cocoon.g5255.exeSize: 51.98 MB (51982328 bytes)
MD5: df28d964f750c39f908346d2aa2aa4dc
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
comodo-dragon.g5255.exe
File name: comodo-dragon.g5255.exeSize: 14 MB (14006504 bytes)
MD5: 20df48785e1faf7bb00c81b0bb581139
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
bittorrent.g5255.exe
File name: bittorrent.g5255.exeSize: 10.49 MB (10498984 bytes)
MD5: 976eed5d12625d525be809429d9a0ea1
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
shareit.g5255.exe
File name: shareit.g5255.exeSize: 14.2 MB (14202120 bytes)
MD5: f82f9ffd0f9869c765074a42ed6d6a84
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
audacity.g5255.exe
File name: audacity.g5255.exeSize: 35.59 MB (35595136 bytes)
MD5: 3a4fdde9c5ff8041d30f5627e6965ea8
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
download-master.g5255.exe
File name: download-master.g5255.exeSize: 15.29 MB (15291272 bytes)
MD5: 313020bb7ae5dbf1dbb6f3bf8ffd6c1c
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
waterfox.g5255.exe
File name: waterfox.g5255.exeSize: 39.43 MB (39430424 bytes)
MD5: 6fb08ac8540da0fafa8dacabbc10af92
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 25, 2023
.\seamonkey.g5255.exe
File name: seamonkey.g5255.exeSize: 43.82 MB (43823632 bytes)
MD5: 7693d991ef8a6c43cfa1938c5c704665
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\skype.g5255.exe
File name: skype.g5255.exeSize: 70.36 MB (70361664 bytes)
MD5: 0d6c54e9f699ccd50ba941f56fbfe91b
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\sony-vegas-pro.g5255.exe
File name: sony-vegas-pro.g5255.exeSize: 12.75 MB (12759928 bytes)
MD5: 18bcc7ebfff8be8463b745a8841cc37c
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\teamspeak.g5255.exe
File name: teamspeak.g5255.exeSize: 85.79 MB (85795344 bytes)
MD5: 66abebb4c88dfdf2f70e6a55e5a7e436
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\tiktok-for-pc.g5255.exe
File name: tiktok-for-pc.g5255.exeSize: 91.32 MB (91320328 bytes)
MD5: 0c997a2c26b39af5732303b6d9a89218
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\kodi.g5255.exe
File name: kodi.g5255.exeSize: 68.61 MB (68617984 bytes)
MD5: 2ba8509a5f2ecc1eca5ae78a0f517cc4
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\pdf-to-jpg.g5255.exe
File name: pdf-to-jpg.g5255.exeSize: 8.93 MB (8936392 bytes)
MD5: 26c98e1cddc89141310fadee30583a39
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\pubg.g5255.exe
File name: pubg.g5255.exeSize: 74.7 MB (74704328 bytes)
MD5: 269202f7707c7f49fcabdfa826d3b5da
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\pubg-mobile.g5255.exe
File name: pubg-mobile.g5255.exeSize: 90.5 MB (90504840 bytes)
MD5: 0b41bd716dda2e93ff241f5091a5ac7f
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\quicktime.g5255.exe
File name: quicktime.g5255.exeSize: 49.38 MB (49384600 bytes)
MD5: cc50f3199ea5daa432866313409ca53f
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\bitcomet.g5255.exe
File name: bitcomet.g5255.exeSize: 10.15 MB (10159536 bytes)
MD5: b5f55ea89d65b649cc537ff7fb5608ac
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\directx.g5255.exe
File name: directx.g5255.exeSize: 7.74 MB (7740744 bytes)
MD5: 63fdb01610588e9cce6d77ec76953e96
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\dropbox.g5255.exe
File name: dropbox.g5255.exeSize: 7.28 MB (7288024 bytes)
MD5: 8e9bf55cf52f1ce727b7e05aefbf9e65
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\epic-browser.g5255.exe
File name: epic-browser.g5255.exeSize: 9.28 MB (9283624 bytes)
MD5: a7d619b36bb2a9454ded9e76b328cd87
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\fortnite.g5255.exe
File name: fortnite.g5255.exeSize: 51.81 MB (51817800 bytes)
MD5: 59bf4bb603cba9be58ebaef50eee062d
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\4k-video-downloader.g5255.exe
File name: 4k-video-downloader.g5255.exeSize: 8.37 MB (8375728 bytes)
MD5: ff20b76603c46045c4b529c2c81dfd7b
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\bandicam-screen-recorder.g5255.exe
File name: bandicam-screen-recorder.g5255.exeSize: 26.19 MB (26190816 bytes)
MD5: bfb915e60900374e2791ebe9369764c1
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
.\battle-net.g5255.exe
File name: battle-net.g5255.exeSize: 11.45 MB (11452872 bytes)
MD5: fdbe79fd3046bbd55ba18f15febba234
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: .
Group: Malware file
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.