Scar
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to give every identifiable malware threat. Our Threat Meter includes several criteria based off of specific malware threats to value their severity, reach and volume. The Threat Meter is able to give you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count, Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic breakdown of how all threats are ranked within our own extensive malware database. The scoring for each specific malware threat can be easily compared to other emerging threats to draw a contrast in its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below: Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model. Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter. Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count. Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement. % Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage. |
||||
---|---|---|---|---|
|
Scar Description
Scar is a Trojan that invades your system and may perform multiple damaging functions. Scar can function as a Trojan downloader f, installing additional malware on a targeted computer or as a launcher for another threatening program, which will be downloaded with Scar. Scar can be detected by numerous names, depending on the security program that found it.
When inside a computer, the affected users will start noticing the presence of various malware kinds since these harmful applications' actions will interfere with the good performance of the device. Every malware consumes large quantities of the machine's resources.
If you notice any symptoms that are pointing to the presence of this threatening Trojan, scan your computer with a trustable malware removal product to get rid of Scar as soon as possible.
Aliases
More aliases (235)
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to Scar may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Download SpyHunter's Malware ScannerNote: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Technical Details
File System Modifications
The following files were created in the system:
%USERPROFILE%\.COMMgr\complmgr.exe
File name: complmgr.exeSize: 526.84 KB (526848 bytes)
MD5: d16fde2a71a2c2d1b1c27aaa7aa1c19d
Detection count: 2,293
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\.COMMgr\
Group: Malware file
Last Updated: September 7, 2010
%SYSTEMDRIVE%\Users\facun\AppData\RDB\Registrytasksys.exe\Registrytasksys.exe
File name: Registrytasksys.exeSize: 2.99 MB (2998272 bytes)
MD5: 3a78e14c10d9c6bbaa0f82fe9e4f1f9d
Detection count: 340
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\facun\AppData\RDB\Registrytasksys.exe\
Group: Malware file
Last Updated: June 26, 2020
%WINDIR%cidrive32.exe
File name: cidrive32.exeSize: 110.59 KB (110592 bytes)
MD5: 195fa4f072ae31762f85c40a2ee6a5bc
Detection count: 110
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%
Group: Malware file
Last Updated: October 27, 2010
sbrv.exe
File name: sbrv.exeSize: 30.2 KB (30208 bytes)
MD5: 37bff5de2a6e2427ffbb560cb29aedc2
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
MsnSys.exe
File name: MsnSys.exeSize: 257.53 KB (257536 bytes)
MD5: 41370853604d9a264be09b832079d75d
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 6, 2010
winservice.exe
File name: winservice.exeSize: 142.33 KB (142336 bytes)
MD5: 84c87990ad010374b94e6b2f341fa93a
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 18, 2010
%PROGRAMFILES%\svhosts\svhosts.exe
File name: svhosts.exeSize: 1.03 MB (1035264 bytes)
MD5: 0f1e731c5b05f10ee8ff0bf7c0abd93a
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\svhosts\
Group: Malware file
Last Updated: March 3, 2017
upd5te.exe
File name: upd5te.exeSize: 170.49 KB (170497 bytes)
MD5: f14cb109d722c76cd0971163133443f4
Detection count: 90
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 6, 2010
svchosts.exe
File name: svchosts.exeSize: 11.26 KB (11264 bytes)
MD5: 9db833fc8dfbc9193cb6062a74111834
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 12, 2010
%WINDIR%svc3.exe
File name: svc3.exeSize: 210.81 KB (210810 bytes)
MD5: fa63d6a190000eb86882bfbd832628d1
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%
Group: Malware file
Last Updated: October 27, 2010
svchost64.exe
File name: svchost64.exeSize: 352.25 KB (352256 bytes)
MD5: 62dd402f0ab70ce42fefbf8147894397
Detection count: 66
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
%APPDATA%\QSound\lcass.exe
File name: lcass.exeSize: 297.98 KB (297984 bytes)
MD5: 1e0321b04b5f23034f1e26f7f13aca7a
Detection count: 54
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\QSound\
Group: Malware file
Last Updated: June 27, 2017
msvmcls64.exe
File name: msvmcls64.exeSize: 331.78 KB (331783 bytes)
MD5: 87a23f973c06a6a6dfdbb8be2aaf9f1c
Detection count: 50
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 1, 2010
%APPDATA%\DCleaner\dcc.exe
File name: dcc.exeSize: 5.02 MB (5029376 bytes)
MD5: 3e45d2a587eaa7289f9d1e465547a010
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\DCleaner\
Group: Malware file
Last Updated: July 14, 2017
mKktGSz.exe
File name: mKktGSz.exeSize: 56.83 KB (56832 bytes)
MD5: 2e92c553f68ecb32e62f356c9a6c1c98
Detection count: 25
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 29, 2010
pV3lLnr.exe
File name: pV3lLnr.exeSize: 55.29 KB (55296 bytes)
MD5: aaac5bd36fa8411b71937c6d4bf4efad
Detection count: 24
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 28, 2010
regedit.exe
File name: regedit.exeSize: 227.32 KB (227328 bytes)
MD5: 614f02e2726bf102bd5edf242702747a
Detection count: 24
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 29, 2010
kernel32.exe
File name: kernel32.exeSize: 936.77 KB (936770 bytes)
MD5: e3a7e0b3a43504ac628b91de92184644
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 28, 2010
C:\P\ircphate.exe
File name: ircphate.exeSize: 61.95 KB (61957 bytes)
MD5: a8985956600aa94b572a8b7d2b0463e3
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: C:\P\
Group: Malware file
Last Updated: October 27, 2010
%ALLUSERSPROFILE%\Application\ApplicationService.exe
File name: ApplicationService.exeSize: 84.47 KB (84476 bytes)
MD5: ac5a7bea155f704846ef3378a1d1ca3c
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application\
Group: Malware file
Last Updated: March 30, 2016
%USERPROFILE%\Pictures\hоst.exe
File name: hоst.exeSize: 871.93 KB (871936 bytes)
MD5: 0559db41dcc6fdd387188a06adbdf879
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Pictures\
Group: Malware file
Last Updated: September 21, 2017
More files
Registry Modifications
The following newly produced Registry Values are:
Regexp file mask%APPDATA%\AudioClient.exe%APPDATA%\DCleaner\dcc.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\winupsvccfg.exe%APPDATA%\XWinCore\wincore.exe%APPDATA%\ZWinReg\winreg.exe%HOMEDRIVE%\Config.Msi\5ce97.rbf.exe%TEMP%\Realtek Audio\service.exe%WINDIR%\windowsmp.exeDirectory%APPDATA%\mxmetamux%APPDATA%\XWinDat