Trojan.Vundo.gen!AW
Posted: January 9, 2012
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Ranking: | 19,191 |
|---|---|
| Threat Level: | 8/10 |
| Infected PCs: | 3,419 |
| First Seen: | January 9, 2012 |
|---|---|
| Last Seen: | January 7, 2025 |
| OS(es) Affected: | Windows |
Aliases
Generic_r.SW [AVG]W32/TDSS.V!tr [Fortinet]Win32.SuspectCrc [Ikarus]Mal/Rorpian-D [Sophos]TR/Jorik.N.1 [AntiVir]BackDoor.Butirat.23 [DrWeb]Trojan.Win32.Jorik.Buterat.eu [Kaspersky]Win32:Zbot-NJE [Trj] [Avast]Trojan.FakeAV!gen71 [Symantec]W32/Backdoor.U.gen!Eldorado [F-Prot]a variant of Win32/Kryptik.RSR [NOD32]PWS-Spyeye.cr [McAfee]Trojan.Jorik.Buterat.eu [CAT-QuickHeal]MalCrypt.Indus! [Comodo]Trojan-FakeAV.Win32.SecurityShield.ajm [Kaspersky]
More aliases (309)
More aliases (309)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%USERPROFILE%\My Documents\Outdoor Stuff\Turkey putt.exe
File name: Turkey putt.exeSize: 443.9 KB (443904 bytes)
MD5: da61c158d037ef386705f80974850902
Detection count: 302
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\My Documents\Outdoor Stuff
Group: Malware file
Last Updated: February 14, 2020
%ALLUSERSPROFILE%\Application Data\PIoBiEVAZgLj8I.exe
File name: PIoBiEVAZgLj8I.exeSize: 368.64 KB (368640 bytes)
MD5: f9bc53659665c27ea2ad88b3285550fb
Detection count: 92
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 11, 2012
%ALLUSERSPROFILE%\Application Data\BBCmcgRlU58D7V.exe
File name: BBCmcgRlU58D7V.exeSize: 363.24 KB (363248 bytes)
MD5: b813a7d54e1c3c75f85c74b62b763757
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 23, 2012
%ALLUSERSPROFILE%\Application Data\pQnPdkMCky.exe
File name: pQnPdkMCky.exeSize: 464.89 KB (464896 bytes)
MD5: 27ef77d5ecf5f1a32fc198390bc4d785
Detection count: 87
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 11, 2012
%APPDATA%\Microsoft\36661.exe
File name: 36661.exeSize: 406.01 KB (406016 bytes)
MD5: baa6f330eceea0f9e7e1cfea7e65181e
Detection count: 76
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft
Group: Malware file
Last Updated: January 11, 2012
%APPDATA%\Remote\rdl61.dll
File name: rdl61.dllSize: 49.66 KB (49664 bytes)
MD5: 90eb6d36f5e99d09019568052bf69b46
Detection count: 75
File type: Dynamic link library
Mime Type: unknown/dll
Path: %APPDATA%\Remote
Group: Malware file
Last Updated: January 11, 2012
%ALLUSERSPROFILE%\Application Data\jgnIDHkbQg.exe
File name: jgnIDHkbQg.exeSize: 452.37 KB (452370 bytes)
MD5: caf8d25b704f581cbfa73032a9357d90
Detection count: 56
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 16, 2012
%ALLUSERSPROFILE%\Application Data\wvgmkfnxrI.exe
File name: wvgmkfnxrI.exeSize: 451.31 KB (451312 bytes)
MD5: 25daaad50d13c910def2642d6e94375f
Detection count: 56
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 23, 2012
%ALLUSERSPROFILE%\Application Data\yytGCCxIFgdpQV.exe
File name: yytGCCxIFgdpQV.exeSize: 349.83 KB (349832 bytes)
MD5: 4d9964f6794ff5c4e0b07c6b0be15186
Detection count: 53
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 11, 2012
C:\Users\<username>\Desktop\ComboFix.exe
File name: ComboFix.exeSize: 4.34 MB (4348461 bytes)
MD5: 5c6b8249c6c710f6b8aa713fa3566c05
Detection count: 49
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\Desktop\ComboFix.exe
Group: Malware file
Last Updated: December 27, 2022
%PROGRAMFILES%\StartupSlowFix\StartupSlowFix.exe
File name: StartupSlowFix.exeSize: 4.92 MB (4928512 bytes)
MD5: 6ee7e966aacf33ddae42f32df09525c6
Detection count: 47
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\StartupSlowFix
Group: Malware file
Last Updated: January 11, 2012
%USERPROFILE%\Local Settings\Application Data\bfsffwg.exe
File name: bfsffwg.exeSize: 326.65 KB (326656 bytes)
MD5: 34192939443af1d0548eeefe1295ed42
Detection count: 46
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data
Group: Malware file
Last Updated: January 30, 2012
%WINDIR%\System32\drivers\ipsec.sys
File name: ipsec.sysSize: 75.26 KB (75264 bytes)
MD5: d35e4e3c4fc71c7d6e586b264bfe5902
Detection count: 35
File type: System file
Mime Type: unknown/sys
Path: %WINDIR%\System32\drivers
Group: Malware file
Last Updated: January 11, 2012
%USERPROFILE%\Local Settings\Application Data\ved.exe
File name: ved.exeSize: 293.37 KB (293376 bytes)
MD5: f1ecc3d500567cc50030a92ddf2f0776
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data
Group: Malware file
Last Updated: January 11, 2012
%ALLUSERSPROFILE%\Application Data\WyjxKjJuynY.exe
File name: WyjxKjJuynY.exeSize: 448.19 KB (448194 bytes)
MD5: ffcb6d9c3859594d21ea0770a031b320
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 16, 2012
%ALLUSERSPROFILE%\Application Data\QFgKkChNdEE.exe
File name: QFgKkChNdEE.exeSize: 449.07 KB (449072 bytes)
MD5: 0452ff991d91fc2ca1f9ca727e0ca0cf
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 13, 2012
%PROGRAMFILES%\ScanBasic\scanbasic.exe
File name: scanbasic.exeSize: 26.11 KB (26112 bytes)
MD5: 4f064d12a01f2afc1a9dc3a09ed0b9fb
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\ScanBasic
Group: Malware file
Last Updated: January 11, 2012
C:\Users\<username>\Desktop\LOGISTICA-PATRIMONIO\IAN PAUL CESAR INGA REYES -\DISCO D\DATA SALVADA\JFRANCO\Mis Documentos\Carpeta Principal\BK\Doc and Set\adm\Doc\Downloads\per2010.exe
File name: per2010.exeSize: 9.62 MB (9622016 bytes)
MD5: 78c3ef34b43a041e68ab3502a28dc683
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\Desktop\LOGISTICA-PATRIMONIO\IAN PAUL CESAR INGA REYES -\DISCO D\DATA SALVADA\JFRANCO\Mis Documentos\Carpeta Principal\BK\Doc and Set\adm\Doc\Downloads\per2010.exe
Group: Malware file
Last Updated: September 24, 2023
%ALLUSERSPROFILE%\vkfmrvj.exe
File name: vkfmrvj.exeSize: 188.41 KB (188416 bytes)
MD5: 1112361fe8a4a845df8bf78cc5dfcc16
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: January 11, 2012
%ALLUSERSPROFILE%\Application Data\JIHYyTpFFCbPF.exe
File name: JIHYyTpFFCbPF.exeSize: 449.06 KB (449062 bytes)
MD5: 81feee5123cc65177aec900e6fe9a362
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: January 13, 2012
%APPDATA%\netprotocol.exe
File name: netprotocol.exeSize: 91.13 KB (91136 bytes)
MD5: 248426f0196bae281cffd300e3c9197c
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 10, 2012
%LOCALAPPDATA%\46a140c1\X
File name: XSize: 60.41 KB (60416 bytes)
MD5: 781eb4c3beb81d3ee0a174e818a7d66b
Detection count: 5
Path: %LOCALAPPDATA%\46a140c1
Group: Malware file
Last Updated: January 11, 2012
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.