Trojan.CodeWall
Posted: April 7, 2016
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 17 |
| First Seen: | April 7, 2016 |
|---|---|
| OS(es) Affected: | Windows |
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:ae6c736808873f.exe
File name: ae6c736808873f.exeSize: 137.21 KB (137216 bytes)
MD5: 84aa78ccf28dc657258b65bf0d24e932
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
a7613389faf118.exe
File name: a7613389faf118.exeSize: 125.44 KB (125440 bytes)
MD5: 4c46f023273fd5659cce04b6cc371977
Detection count: 90
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
8d5926525ed219.exe
File name: 8d5926525ed219.exeSize: 187.39 KB (187392 bytes)
MD5: 22a078e90e444a731bf858ffb5369f28
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
8c2f8d3b268b62.exe
File name: 8c2f8d3b268b62.exeSize: 288.76 KB (288768 bytes)
MD5: 7e23198d61ee4bc34d49096b4f119117
Detection count: 85
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
883d36b9cd66d5.exe
File name: 883d36b9cd66d5.exeSize: 219.64 KB (219648 bytes)
MD5: aa32f718d8a840b3cb8c086a3180cd22
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
870fe09c93c480.exe
File name: 870fe09c93c480.exeSize: 1.37 MB (1375232 bytes)
MD5: 4ca64fe2af61c945e38a4dbd03f9143f
Detection count: 83
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
85fd7e89079f6e.exe
File name: 85fd7e89079f6e.exeSize: 396.8 KB (396800 bytes)
MD5: 42e3166394a666daff9b1291bedb8107
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
83e844995fa9fa.exe
File name: 83e844995fa9fa.exeSize: 129.02 KB (129024 bytes)
MD5: db703c0def6429fbf666d7a3b96787d5
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
8279aa6fbd1555.exe
File name: 8279aa6fbd1555.exeSize: 127.48 KB (127488 bytes)
MD5: fb86dababeb56ca6889493878936cb20
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
66882a0ba296a6.exe
File name: 66882a0ba296a6.exeSize: 253.48 KB (253489 bytes)
MD5: 2658b6fa6f1769bfb1452a22d11ed903
Detection count: 76
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
665959e7d342db.exe
File name: 665959e7d342db.exeSize: 125.95 KB (125952 bytes)
MD5: ce94261bc7792f1dcb068a843cd874e8
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
665459eb063803.exe
File name: 665459eb063803.exeSize: 210.94 KB (210944 bytes)
MD5: 452c38da658028c927e44234a9158a61
Detection count: 74
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
5dbf4b56714287.exe
File name: 5dbf4b56714287.exeSize: 253.47 KB (253473 bytes)
MD5: e646812a409e3e18e40d486076d25d63
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
5c12c23cb70848.exe
File name: 5c12c23cb70848.exeSize: 226.81 KB (226816 bytes)
MD5: 3391412a0519e768032cf0264a383af0
Detection count: 72
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
566e971afc643d.exe
File name: 566e971afc643d.exeSize: 127.48 KB (127488 bytes)
MD5: bf3f171c9168aa3394d078b1ab118400
Detection count: 71
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
4a8a40591e7357.exe
File name: 4a8a40591e7357.exeSize: 127.48 KB (127488 bytes)
MD5: 7c56fe74f734bc7769579b9511ee0afa
Detection count: 70
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
ed59523a9976e7.exe
File name: ed59523a9976e7.exeSize: 230.4 KB (230400 bytes)
MD5: d82649c84be3c97101c2b3d84729ef10
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
ec5e80d868affa.exe
File name: ec5e80d868affa.exeSize: 396.8 KB (396800 bytes)
MD5: 8de129d4c5f4f0ad4668b94c17912ce4
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
e695f03936c4fa.exe
File name: e695f03936c4fa.exeSize: 141.31 KB (141312 bytes)
MD5: 5896f54442ef18f1d13f83bfa59e635c
Detection count: 4
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
e54cbae7b661ea.exe
File name: e54cbae7b661ea.exeSize: 127.48 KB (127488 bytes)
MD5: b7a0103a5acaceaec34123ffa3ba6e8c
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
d7f94a97056983.exe
File name: d7f94a97056983.exeSize: 132.6 KB (132608 bytes)
MD5: da6428a06c1e088f58a48853572f3931
Detection count: 2
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
d79e86b3f5ed23.exe
File name: d79e86b3f5ed23.exeSize: 127.48 KB (127488 bytes)
MD5: 1c5ab85b9b076da59ac47a2373c9c050
Detection count: 1
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
d66a4a6b8afeaa.exe
File name: d66a4a6b8afeaa.exeSize: 244.22 KB (244224 bytes)
MD5: 60e69a556b47773672b75ca023932d69
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: April 7, 2016
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.