Posted: April 20, 2012
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
|First Seen:||April 20, 2012|
|Last Seen:||March 3, 2021|
Trojan.Encoder.94 is a detection label for an English-language variant of a ransomware Trojan that encrypts a variety of media files on the infected computer and requests a fee to undo this attack, which, in the meantime, will cause these files to be inaccessible. Although earlier variants of Trojan.Encoder.94 were commonly distributed throughout Russia and other ex-Soviet Union countries, newer versions of ransomware Trojans from this family, like Trojan.Encoder.94, have been seen in significant quantities in other countries throughout Europe. SpywareRemove.com malware researchers discourage paying Trojan.Encoder.94's fee to regain access to your files, since many encrypt attack-based Trojans have either their encryption methods or their keys freely circulated by various PC security companies after a sufficient period of analysis. Trojan.Encoder.94 itself can be removed by any reasonably qualified anti-malware product, and an in-depth system scan is recommended as soon as you catch sight of any symptoms of a Trojan.Encoder.94 attack.
Trojan.Encoder.94 – a Trojan That's Steadily Sabotaging Computers from East to West
As with every other ransomware Trojan the world over, Trojan.Encoder.94 operates by hindering your computer in an attempt to extract a ransom fee, in Trojan.Encoder.94's case, via online financial services like Ukash. However, Trojan.Encoder.94 isn't related to the relatively less dangerous Ukash Virus family, as Trojan.Encoder.94 has a real threat to back up its ransom attack. Instead of taking the easy route of accusing you of committing fake crimes or blocking programs, Trojan.Encoder.94 will attack your text documents, audio files and even archives (such as .zip files) directly with an encryption function to prevent you from using them.
Trojan.Encoder.94's family has been popularly identified since 2010 as a PC threat that originally targeted former members of the Soviet Union. However, variants of Trojan.Encoder.94 are still being developed on an ongoing basis for other countries, with a marked tendency to spread westwards to France, Germany and other European regions. SpywareRemove.com malware researchers note that variants of Trojan.Encoder.94 tend to be unlike from each other only in the keys that are used to remove their encryption.
What You Can Do to Salvage Your Files from Trojan.Encoder.94's Plundering
As of the time of this writing, at least one PC security company has been confirmed to distribute a decryptor service that will reverse Trojan.Encoder.94's encryption attack for free, and SpywareRemove.com malware researchers recommend the utilization of such tools in lieu of paying Trojan.Encoder.94's illegal fee. Appropriate usage of decryption programs should restore your files to their original and unencrypted formats without any permanent damage.
Regardless of whether or not you need to get your files back, Trojan.Encoder.94 should never be allowed to remain on your PC. Modern versions of Trojan.Encoder.94 consistently keep their files in the Windows Temp folder. SpywareRemove.com malware researchers recommend that you remove Trojan.Encoder.94's files with anti-malware products, since manual removal may leave system changes that are related to a Trojan.Encoder.94 infection or associated PC threats still on your computer.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to Trojan.Encoder.94 may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.