Trojan.Cassiopeia
Posted: February 26, 2016
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 1,073 |
| First Seen: | February 26, 2016 |
|---|---|
| Last Seen: | June 6, 2024 |
| OS(es) Affected: | Windows |
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:a1904713bb00c2d647778a86dcc4c2c10a606cb3c9ccdc838a3db24ee0732eb3.exe
File name: a1904713bb00c2d647778a86dcc4c2c10a606cb3c9ccdc838a3db24ee0732eb3.exeSize: 339.96 KB (339968 bytes)
MD5: da2335d7fc9edc295416e8914269f606
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
a11c6c205c252ed2794da32b804aabbf6c764347d803c8b732010f3fdb5f00ab.exe
File name: a11c6c205c252ed2794da32b804aabbf6c764347d803c8b732010f3fdb5f00ab.exeSize: 880.24 KB (880242 bytes)
MD5: 9fe3e2ac1e197982ab8b8511f7816718
Detection count: 32
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
a0b693e645036a481c28a512102a4245176ed290779ebe7913f4c23eeec4f5e7.exe
File name: a0b693e645036a481c28a512102a4245176ed290779ebe7913f4c23eeec4f5e7.exeSize: 77.82 KB (77824 bytes)
MD5: 30aa29c0b44995538169b0479b05f991
Detection count: 31
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
9ae6318de2909d8930be0efe4d2608dbb052e08b3026305962d50e1bea2d5687.exe
File name: 9ae6318de2909d8930be0efe4d2608dbb052e08b3026305962d50e1bea2d5687.exeSize: 1.64 MB (1643008 bytes)
MD5: 6e08d2540fbd27f366e7a9021ddba31c
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
817b158374e03e914831c673bed1fd241940da86bbcfb903ced7df55e336ad65.exe
File name: 817b158374e03e914831c673bed1fd241940da86bbcfb903ced7df55e336ad65.exeSize: 1.05 MB (1051136 bytes)
MD5: 98dcced307f5d75941b2e5c4d6853145
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
811d775193d0e7e83dfbc1906df229b3b3008b25a764e8245bbb7aef87b90294.exe
File name: 811d775193d0e7e83dfbc1906df229b3b3008b25a764e8245bbb7aef87b90294.exeSize: 101.37 KB (101376 bytes)
MD5: 7c90fddcc4430e24a0340b97d815ad6b
Detection count: 25
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
7e4efd3dad0dad6ab59120b8f63c338816a697180f406bb317577bb80b7a13d7.exe
File name: 7e4efd3dad0dad6ab59120b8f63c338816a697180f406bb317577bb80b7a13d7.exeSize: 425.98 KB (425984 bytes)
MD5: c645681c945e9cf40c6cdbc23e350e03
Detection count: 24
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
6d416c397be017532da3dafcebdd750ac705d17b1a666174451da2be4f0f5c6f.exe
File name: 6d416c397be017532da3dafcebdd750ac705d17b1a666174451da2be4f0f5c6f.exeSize: 8.06 MB (8066721 bytes)
MD5: 63761908cbc864c7da66b86b0c2578e4
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
6c82eb5621ad650a5ee7a700ef2d1e63ae1e323b35581a65eeb14a96b42762bd.exe
File name: 6c82eb5621ad650a5ee7a700ef2d1e63ae1e323b35581a65eeb14a96b42762bd.exeSize: 385.53 KB (385536 bytes)
MD5: b266c06b43bec09a0c442cecb0745df6
Detection count: 22
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
5ce3cd83ee9bae0fdf22bc92356910ebcd4163a5477bcce727e1fb7d2b4d6827.exe
File name: 5ce3cd83ee9bae0fdf22bc92356910ebcd4163a5477bcce727e1fb7d2b4d6827.exeSize: 1.69 MB (1698304 bytes)
MD5: e688034029d38d4dade646f7aeb2cf1f
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
5c6a4bd37fefd0b6128fe66647425ca1f50e958f4250d42e095ffe3b24a934c3.exe
File name: 5c6a4bd37fefd0b6128fe66647425ca1f50e958f4250d42e095ffe3b24a934c3.exeSize: 637.44 KB (637440 bytes)
MD5: f969830f22db449eabb303d47fff7bf7
Detection count: 20
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
529a3c2d1271cdf938fd927132b07eded5cfc88399b228756eec552a03ca135b.exe
File name: 529a3c2d1271cdf938fd927132b07eded5cfc88399b228756eec552a03ca135b.exeSize: 786.94 KB (786944 bytes)
MD5: 19756b75b1e4444e08e654c98333ab37
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
4c506285fceb5f87d337dda622c4d57721333182443b4867790aa627d58327f4.exe
File name: 4c506285fceb5f87d337dda622c4d57721333182443b4867790aa627d58327f4.exeSize: 135.16 KB (135168 bytes)
MD5: c9e69fcd8471fdd0dd5b65c84bdd76a2
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
434bbfc3065a8feb914ac4295da5ac74c488d98b5fd34f879a36b25190e6ea70.exe
File name: 434bbfc3065a8feb914ac4295da5ac74c488d98b5fd34f879a36b25190e6ea70.exeSize: 710.14 KB (710144 bytes)
MD5: e8c194fd887d4efecf48fd62ce6b3a1f
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
4291ee68a903c4272103a38e5ded814b2ea8c2beede6f3068bf29cbc66d00b5a.exe
File name: 4291ee68a903c4272103a38e5ded814b2ea8c2beede6f3068bf29cbc66d00b5a.exeSize: 332.28 KB (332288 bytes)
MD5: 9fdcaf2a3d0bc46010218a60879e8605
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
3d46884a9ba4fef66f190bd9aa8de2bd1bfe26a16ecb159e7c59adf3ffb29e5b.exe
File name: 3d46884a9ba4fef66f190bd9aa8de2bd1bfe26a16ecb159e7c59adf3ffb29e5b.exeSize: 614.4 KB (614400 bytes)
MD5: 840d4fab1fde92745e195ae2ee28ae77
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
30173f28a3edc081c1675b61cdd91e99426857cd2b65b3d986d7bf9ebe1e95b2.exe
File name: 30173f28a3edc081c1675b61cdd91e99426857cd2b65b3d986d7bf9ebe1e95b2.exeSize: 720.89 KB (720896 bytes)
MD5: b3c982ad3ce42aee765818690fcdbd60
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
2bfc3a4bb2a8da72075d8170b57a96760cc0c830803b42d5298f2f6dc9bc00fa.exe
File name: 2bfc3a4bb2a8da72075d8170b57a96760cc0c830803b42d5298f2f6dc9bc00fa.exeSize: 1.21 MB (1216512 bytes)
MD5: 901456ece22b5ca46ab45565c79c00a1
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
14f76e917a053299f516f936eaada678b0a1632657215920e900926bada0fe77.exe
File name: 14f76e917a053299f516f936eaada678b0a1632657215920e900926bada0fe77.exeSize: 573.44 KB (573440 bytes)
MD5: a8e8c41f85ffc9bec2e783a23db7062f
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
0f74e3a7f923a3370464843d45947137ffc977aefb7d5300524d2fc589df7c41.exe
File name: 0f74e3a7f923a3370464843d45947137ffc977aefb7d5300524d2fc589df7c41.exeSize: 466.94 KB (466944 bytes)
MD5: 298a0c7c02e54def64219c2f41f017e0
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
0b9f6d87ae6747dd0ab3ff96edbff3f3157724c90f48102a512ac5f2aab23867.exe
File name: 0b9f6d87ae6747dd0ab3ff96edbff3f3157724c90f48102a512ac5f2aab23867.exeSize: 294.91 KB (294912 bytes)
MD5: 0e0a73fa11c19862c938110289a151f2
Detection count: 4
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 26, 2016
More files
Registry Modifications
The following newly produced Registry Values are:
Regexp file mask%APPDATA%\msnmsgrs.exeHKEY..\..\..\..{RegistryKeys}Software\Microsoft\Windows\CurrentVersion\Run\msnmsgrs
Regexp file mask%APPDATA%\msnmsgrs.exeHKEY..\..\..\..{RegistryKeys}Software\Microsoft\Windows\CurrentVersion\Run\msnmsgrs
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.