Trojan.Kovter
Posted: September 17, 2015
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 9,654 |
---|---|
Threat Level: | 8/10 |
Infected PCs: | 33,366 |
First Seen: | September 17, 2015 |
---|---|
Last Seen: | September 4, 2023 |
OS(es) Affected: | Windows |
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SYSTEMDRIVE%\Users\<username>\appdata\local\fadirhon\farsikisoz.uvxo
File name: farsikisoz.uvxoSize: 40 KB (40003 bytes)
MD5: 4f3ee8636b9f4efc7b06ae69af6e65bd
Detection count: 124
Mime Type: unknown/uvxo
Path: %SYSTEMDRIVE%\Users\<username>\appdata\local\fadirhon\farsikisoz.uvxo
Group: Malware file
Last Updated: June 26, 2020
%SYSTEMDRIVE%\Users\<username>\appdata\local\hydrywi\dtibqobre.pivrica
File name: dtibqobre.pivricaSize: 31.7 KB (31703 bytes)
MD5: 55099c1243b18b63790890fb583362b8
Detection count: 124
Mime Type: unknown/pivrica
Path: %SYSTEMDRIVE%\Users\<username>\appdata\local\hydrywi\dtibqobre.pivrica
Group: Malware file
Last Updated: June 26, 2020
736ea22476c32d8d11cbab009954680f3c04228894a71c03aff829f521f3a23a.exe
File name: 736ea22476c32d8d11cbab009954680f3c04228894a71c03aff829f521f3a23a.exeSize: 432.04 KB (432042 bytes)
MD5: 8aec193ad09d0e09e0d89378269dbdfe
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
7993c9c641855ac289e2f54ea47415520bb5343189e1f0e8e936b7323fc4faa6.exe
File name: 7993c9c641855ac289e2f54ea47415520bb5343189e1f0e8e936b7323fc4faa6.exeSize: 431.88 KB (431884 bytes)
MD5: 933e084c914a2158d365d305f655f523
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
517f5f6cbbe2ceb720ca5c31217f8ac8ea87d8d3c2130109d4af143021082358.exe
File name: 517f5f6cbbe2ceb720ca5c31217f8ac8ea87d8d3c2130109d4af143021082358.exeSize: 434.35 KB (434356 bytes)
MD5: c662387202f2823b89cde787dc9de321
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
5a54bae853de0cb4b7615638d3d4df45743098c3ef02c48775aa1fc557d9a1c6.exe
File name: 5a54bae853de0cb4b7615638d3d4df45743098c3ef02c48775aa1fc557d9a1c6.exeSize: 439.27 KB (439271 bytes)
MD5: f4f7e271f11aa49ffbbb72ae6ce26de5
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
6660f171943d508aab8cfb32c71170183d00192260eaaa38d3439983f54541ff.exe
File name: 6660f171943d508aab8cfb32c71170183d00192260eaaa38d3439983f54541ff.exeSize: 431.8 KB (431807 bytes)
MD5: 196cacdbf47e07922c9bf91faedb03e3
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
66dfe0839f44469bf292c2c60d211c3909d0c77ffa59b6b76004d43616f26275.exe
File name: 66dfe0839f44469bf292c2c60d211c3909d0c77ffa59b6b76004d43616f26275.exeSize: 434.61 KB (434618 bytes)
MD5: 71558fa8955fbc99c6a7b9da267aa8f5
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
71053497187837089b6d29ac2f95da21f4a9f318c33b39790e8fc2af3de64c95.exe
File name: 71053497187837089b6d29ac2f95da21f4a9f318c33b39790e8fc2af3de64c95.exeSize: 434.27 KB (434278 bytes)
MD5: c61d05fdaefa08ee98bf4b6b8514b1fa
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
4ab4d34b6988eefa72c6670d41b98ee95809da65dd23b1d5f10ebc58d0bdb855.exe
File name: 4ab4d34b6988eefa72c6670d41b98ee95809da65dd23b1d5f10ebc58d0bdb855.exeSize: 431.68 KB (431683 bytes)
MD5: 516517dbc9b297f6f038c98503c5f8d3
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
4b326e5bfedd79fe9d17064a208418df6c4e7d320b739af2c04f7dd8c35230d0.exe
File name: 4b326e5bfedd79fe9d17064a208418df6c4e7d320b739af2c04f7dd8c35230d0.exeSize: 434.4 KB (434403 bytes)
MD5: c712296eb88253067536d1edba133e1f
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
4f3d397d5c2ee51db25f7ea9bc7e9c233025056e3a2dea407ba63e5fd691bd88.exe
File name: 4f3d397d5c2ee51db25f7ea9bc7e9c233025056e3a2dea407ba63e5fd691bd88.exeSize: 431.85 KB (431857 bytes)
MD5: 06fc6975970f6251734e128e202ea877
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
4fd1f48676779fbe429bf7081b8d83907652d17495691f438467ec9f7d410215.exe
File name: 4fd1f48676779fbe429bf7081b8d83907652d17495691f438467ec9f7d410215.exeSize: 431.9 KB (431905 bytes)
MD5: cb7422bcf1c0054527b139399ed5a86d
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
511dc04f1be9cb6366765b08c87035414cf7c1734f12b8af42ba930f7369e7c1.exe
File name: 511dc04f1be9cb6366765b08c87035414cf7c1734f12b8af42ba930f7369e7c1.exeSize: 431.9 KB (431901 bytes)
MD5: cb815d67aec1d90825f4d8dc83b40b0c
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
35c66f746a5a0ce7e283b309c197c464d1eb4c980dd005417885dae8563d9f6e.exe
File name: 35c66f746a5a0ce7e283b309c197c464d1eb4c980dd005417885dae8563d9f6e.exeSize: 434.36 KB (434369 bytes)
MD5: cb08f171a82d354a776a7f2d9bab8e7d
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
39f67f6666171633afdee93aea1085b18583851d2f7a06d3eecd635407f061d4.exe
File name: 39f67f6666171633afdee93aea1085b18583851d2f7a06d3eecd635407f061d4.exeSize: 431.72 KB (431728 bytes)
MD5: d953b45a91b62989bc79a0214a95e7b4
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
4170f828224fd992bdd573aa878ae73627f3a8efff766c25ec98707ab6dee721.exe
File name: 4170f828224fd992bdd573aa878ae73627f3a8efff766c25ec98707ab6dee721.exeSize: 434.49 KB (434499 bytes)
MD5: 41e3537fce0845014668006283195fd5
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
418729bf414fa41a15e46c505bc22106d55d0584523dcf0960edce5ff8ec07e0.exe
File name: 418729bf414fa41a15e46c505bc22106d55d0584523dcf0960edce5ff8ec07e0.exeSize: 434.47 KB (434475 bytes)
MD5: 430e48ef3d58b63ee6422ecab83745d2
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
41f111bf9ffb7193d75f6b57b44589e858ba0cd9ebec21aa2e668b1d907cd1fd.exe
File name: 41f111bf9ffb7193d75f6b57b44589e858ba0cd9ebec21aa2e668b1d907cd1fd.exeSize: 434.36 KB (434364 bytes)
MD5: 2197bac5f970ecbab49d9a4e0d921037
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
2c0cbb0951b1cecb23ed0dd23d34ee9f695008831909bca0114c0b42908679ef.exe
File name: 2c0cbb0951b1cecb23ed0dd23d34ee9f695008831909bca0114c0b42908679ef.exeSize: 450.31 KB (450316 bytes)
MD5: 246428258703a8d4aa60bbefa53ea9f1
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
2c19e2d256bb104c7cfdc2e832db3ef2b52aa3fb7fb413fafff443767d64ba21.exe
File name: 2c19e2d256bb104c7cfdc2e832db3ef2b52aa3fb7fb413fafff443767d64ba21.exeSize: 435.55 KB (435555 bytes)
MD5: d5cba842097fefd023ee19c8de166b93
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
2c466b2be82199c1d4cab1fe95025cf630b7f7718844a546bbaad0da3f03d062.exe
File name: 2c466b2be82199c1d4cab1fe95025cf630b7f7718844a546bbaad0da3f03d062.exeSize: 431.86 KB (431862 bytes)
MD5: 3a78e72e4098b3fcbde4b6433bfd2ff7
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
2e532ff5f7bba39bc93bace65baf23b723e1bef1ada10fe30ee4b2676c71edc8.exe
File name: 2e532ff5f7bba39bc93bace65baf23b723e1bef1ada10fe30ee4b2676c71edc8.exeSize: 435.59 KB (435592 bytes)
MD5: 33af0164823ab67d99a3b8e081d2e190
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
306bd2679cf70ed7ea38d3f14ce77db164f6cbbb777f06282bdb0be400199bd9.exe
File name: 306bd2679cf70ed7ea38d3f14ce77db164f6cbbb777f06282bdb0be400199bd9.exeSize: 431.9 KB (431908 bytes)
MD5: 15ac980839746a37f5c6576bd7e5d9a3
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.