Trojan.Vilsel
Posted: April 21, 2010
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 2,661 |
| First Seen: | April 20, 2010 |
|---|---|
| Last Seen: | October 6, 2024 |
| OS(es) Affected: | Windows |
Trojan.Vilsel is a malicious Trojan infection which contains a dangerous hidden functionality. Computers infected with Trojan.Vilsel may also experience Adware, Spyware, Malware, Remote access Tools, Browser Hijack Tools and Data Mining. Trojan.Vilsel poses a severe threat to system security and must be terminated before it wreaks havoc on the compromised computer.
Aliases
Generic21.ACKM [AVG]Trojan.Vilsel [Ikarus]TR/Vilsel.axip [AntiVir]TrojWare.Win32.Trojan.Agent.~OHA [Comodo]Win32.TRVilsel.Axip [eSafe]SHeur3.BFSI [AVG]Gen.Win32 [Ikarus]Win-Trojan/Injector.114688.Y [AhnLab-V3]TR/Agent.bfpp [AntiVir]Gen:Win32.ExplorerHijack.hmW@a8qkptd [BitDefender]Trojan.Win32.Scar.cyzr [Kaspersky]Win32.GenExplorerHij [eSafe]Artemis!ACB533A73D59 [McAfee]Artemis!95CB693EF37D [McAfee]Trojan.Win32.Ragterneb [Ikarus]
More aliases (128)
More aliases (128)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:f61863936a35cc60fa473bc877c3f2e8911723e40ada74a15c02ed2789efba50.exe
File name: f61863936a35cc60fa473bc877c3f2e8911723e40ada74a15c02ed2789efba50.exeSize: 73.81 KB (73816 bytes)
MD5: 99fd3ea06c5b7dc4d6ac29360b44ff67
Detection count: 46
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
ee781b1a40536c49276fd145e70a49e474202b89282a3bb4bf038c124eaa97c9.exe
File name: ee781b1a40536c49276fd145e70a49e474202b89282a3bb4bf038c124eaa97c9.exeSize: 73.8 KB (73804 bytes)
MD5: 7ecd1179f452b0d051d9f7a44f568f00
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
ed91d80260eca4271919ec4a045f16db418238c5f0a5e170cf0c5b2a1032feee.exe
File name: ed91d80260eca4271919ec4a045f16db418238c5f0a5e170cf0c5b2a1032feee.exeSize: 73.79 KB (73798 bytes)
MD5: 199af63e85a50ba05ea0444d0c9eebbb
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
cb28ea5e1eaaebe6e4dc83f19917bd5fcf76e11edac609d579cb1a2275c0d66e.exe
File name: cb28ea5e1eaaebe6e4dc83f19917bd5fcf76e11edac609d579cb1a2275c0d66e.exeSize: 73.81 KB (73818 bytes)
MD5: a7eeafdcbc19ece7e1ed56b8a6fe65a9
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
c44b085de314807e0208e83b4a2e7601cf36a9ac3a192ba82b369fe404c32eed.exe
File name: c44b085de314807e0208e83b4a2e7601cf36a9ac3a192ba82b369fe404c32eed.exeSize: 73.82 KB (73822 bytes)
MD5: 5c75ba85ca579a461607c0e69ee0c6b2
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
c37c6169a1124e9e17370afe00cdb76b89de48ad03498068c3eb02b1d2ee19e9.exe
File name: c37c6169a1124e9e17370afe00cdb76b89de48ad03498068c3eb02b1d2ee19e9.exeSize: 73.8 KB (73806 bytes)
MD5: ed018978ea7444c821442eb922f296c2
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
c1ddd9f4fbb94acb2d71f93d8a1e72cf716d8c8d30ef6676ecf3329da8ae4b85.exe
File name: c1ddd9f4fbb94acb2d71f93d8a1e72cf716d8c8d30ef6676ecf3329da8ae4b85.exeSize: 73.81 KB (73816 bytes)
MD5: e392263ada85b315c57913b671ea1587
Detection count: 32
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
b99b4d4f0b386be4b47eef007ea62cb5d51890e213e95e0dda7bef183e3ad1d0.exe
File name: b99b4d4f0b386be4b47eef007ea62cb5d51890e213e95e0dda7bef183e3ad1d0.exeSize: 73.8 KB (73804 bytes)
MD5: 2de4fed1c37f33446ce624ffcbcf013d
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
a5a7f6cb264e2c63d2c57237c3daf3aba35ef8237061b0c0371041a05da1928a.exe
File name: a5a7f6cb264e2c63d2c57237c3daf3aba35ef8237061b0c0371041a05da1928a.exeSize: 73.81 KB (73818 bytes)
MD5: 6b4d393583df55476ec0025252be6f96
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
a0782bffd416ca7e412fc6e7b03ff3bab59452e063110e374896152747b1629c.exe
File name: a0782bffd416ca7e412fc6e7b03ff3bab59452e063110e374896152747b1629c.exeSize: 73.81 KB (73812 bytes)
MD5: 4149ec6fedbd47b793873fbcf29b496e
Detection count: 25
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
9afc0909f54e5700c6b228a76eb7c9ecd92db17b1f830b92472b11c29864e857.exe
File name: 9afc0909f54e5700c6b228a76eb7c9ecd92db17b1f830b92472b11c29864e857.exeSize: 73.8 KB (73802 bytes)
MD5: 583b67d61b1490094132b85e784fded3
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
924ced8798905db97695ce3be08f5db8a63db7b38956d9638b076af4790403b3.exe
File name: 924ced8798905db97695ce3be08f5db8a63db7b38956d9638b076af4790403b3.exeSize: 73.81 KB (73816 bytes)
MD5: b1ac207dde6e93f121ec8b3c7007dcec
Detection count: 22
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
827bdefe7c7ef315ea6fc31e1c5d9451567daa29ed9d8bc06cf25a221a966177.exe
File name: 827bdefe7c7ef315ea6fc31e1c5d9451567daa29ed9d8bc06cf25a221a966177.exeSize: 73.81 KB (73818 bytes)
MD5: 5a8c874a3c625eff5af440b5c0554991
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
72008b312f0069ee57a133e88e81d5f06cf5b264a7024f1346fbc26bc6d1adc9.exe
File name: 72008b312f0069ee57a133e88e81d5f06cf5b264a7024f1346fbc26bc6d1adc9.exeSize: 73.82 KB (73826 bytes)
MD5: ca442319a8a3ba89ff59b821c29e1cc2
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
4f17f97eb46f51581b264b3c2f881d08578d5aef476d42692d32ac9b51a6ddc6.exe
File name: 4f17f97eb46f51581b264b3c2f881d08578d5aef476d42692d32ac9b51a6ddc6.exeSize: 73.81 KB (73810 bytes)
MD5: 27e4b9b31846b6da9a8b3ba6626bbb11
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
4360ff49125da0d29ceccbe0527c93d090564f060bf6d47f2dfd5ef27fcf59fb.exe
File name: 4360ff49125da0d29ceccbe0527c93d090564f060bf6d47f2dfd5ef27fcf59fb.exeSize: 73.81 KB (73818 bytes)
MD5: 58b3d5da3937fb8d813b4843b2b6b1f7
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
2fa4bd01a69f2e2cf597220e2db8a32d931f7e6e326943e7ed7e59a0e355960c.exe
File name: 2fa4bd01a69f2e2cf597220e2db8a32d931f7e6e326943e7ed7e59a0e355960c.exeSize: 73.81 KB (73816 bytes)
MD5: 2611fe464102562fea3fda0aeb7dd04b
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
29de01a3862ac32edd3e627be33d93bf3236379ff3bfe8e042284df380fbf49b.exe
File name: 29de01a3862ac32edd3e627be33d93bf3236379ff3bfe8e042284df380fbf49b.exeSize: 73.8 KB (73804 bytes)
MD5: f636a2d647255d8686b41c2e41e0a2d3
Detection count: 1
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
28644218180573090215890fa469df9e0a3e85bad60b514ee38b3a3d2b1db4cf.exe
File name: 28644218180573090215890fa469df9e0a3e85bad60b514ee38b3a3d2b1db4cf.exeSize: 73.81 KB (73812 bytes)
MD5: 79710e986c2b44c3033ffc534179d0f3
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 10, 2016
More files
Thanks xD