VBInject.AM
Posted: December 7, 2010
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 220 |
First Seen: | December 7, 2010 |
---|---|
OS(es) Affected: | Windows |
Aliases
Mal/FakeAV-CZ [Sophos]FakeAlert-SecurityTool.a [McAfee]Trojan.Fakealert.14464 [DrWeb]Gen:Heur.Krypt.4 [BitDefender]Trojan.FakeAV!gen27 [Symantec]FraudTool.Win32.SecurityTool (v) [Sunbelt]a variant of Win32/Kryptik.FTT [NOD32]FakeAlert-SpyPro.gen.p [McAfee]Trojan.Fakealert.18562 [DrWeb]Trojan.Generic.KD.23842 [BitDefender]Cryptic.ARW [AVG]Win32/Chksyn.AB [NOD32]Artemis!7B74ACB5AFFC [McAfee]Win32.HLLW.Autoruner.24025 [DrWeb]Agent2.BCJF [AVG]
More aliases (191)
More aliases (191)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\lsass.exe
File name: lsass.exeSize: 339.96 KB (339969 bytes)
MD5: 128a243ecbf8968a2a60b90b9d3d7057
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: December 8, 2010
%USERPROFILE%\Local Settings\Application Data\00342441.exe
File name: 00342441.exeSize: 1.03 MB (1036288 bytes)
MD5: cb537b0f25d1fcaf868704241813d45d
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data
Group: Malware file
Last Updated: December 8, 2010
kbupdate.dll
File name: kbupdate.dllSize: 20.99 KB (20992 bytes)
MD5: fd5b4eb678a770ab28717e57e22e8b64
Detection count: 37
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 8, 2010
%APPDATA%\TOM\iexploer.exe
File name: iexploer.exeSize: 390.72 KB (390724 bytes)
MD5: 448eee4b2e51b63c348282fe06916d50
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\TOM
Group: Malware file
Last Updated: December 7, 2010
%PUBLIC%\winsvcn.exe
File name: winsvcn.exeSize: 84.99 KB (84992 bytes)
MD5: 507243ae518e2e9b4abbb5e45189bf3f
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %PUBLIC%
Group: Malware file
Last Updated: December 8, 2010
%APPDATA%\msng.exe
File name: msng.exeSize: 229.37 KB (229376 bytes)
MD5: d6cd68a12d3e04796b62917c162ffde8
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: December 8, 2010
kbupdate.dll
File name: kbupdate.dllSize: 20.99 KB (20992 bytes)
MD5: 814092f0b1aba3caa0a846e727d5e5f4
Detection count: 28
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\winlogonnd.exe
File name: winlogonnd.exeSize: 693.26 KB (693261 bytes)
MD5: 3de98e584ce03e2e67ba5fce4855fbd3
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\Iasex.dll
File name: Iasex.dllSize: 73.74 KB (73748 bytes)
MD5: 78be5422236a0488d6dd4834c194188f
Detection count: 20
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 8, 2010
%ALLUSERSPROFILE%\Application Data\Macromedia\SwUpdate\swupdate.dll.tmp
File name: swupdate.dll.tmpSize: 38.91 KB (38912 bytes)
MD5: 7b74acb5affc8b8a6206cf5219ab5da4
Detection count: 15
File type: Temporary File
Mime Type: unknown/tmp
Path: %ALLUSERSPROFILE%\Application Data\Macromedia\SwUpdate
Group: Malware file
Last Updated: December 8, 2010
%APPDATA%\nvdisp.exe
File name: nvdisp.exeSize: 1.1 MB (1103038 bytes)
MD5: f7dc807bb4e6a91267d26105e849fb40
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: December 8, 2010
%USERPROFILE%\Local Settings\Application Data\localmsvcdg\localmsvcdg.dll
File name: localmsvcdg.dllSize: 69.63 KB (69632 bytes)
MD5: 6273e7c04296f36fb37c4bc4e3efcd6f
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %USERPROFILE%\Local Settings\Application Data\localmsvcdg
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\secfil.exe
File name: secfil.exeSize: 90.11 KB (90112 bytes)
MD5: fa6e56b24b74b7f4f21714050ee9a6ed
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%
Group: Malware file
Last Updated: December 8, 2010
G:\download\Adobe Creative Suite 5 Master Collection -Tested CS5\Activator\Activate.exe
File name: Activate.exeSize: 2.38 MB (2386211 bytes)
MD5: 86935fc950c5ce087fb1ec63e2c52979
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: G:\download\Adobe Creative Suite 5 Master Collection -Tested CS5\Activator
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\TEMP\q8vc.exe
File name: q8vc.exeSize: 56.83 KB (56832 bytes)
MD5: b446cff16f7279155262ea5a17d085d9
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\TEMP
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\RAL0BBJ4FW\F001.exe
File name: F001.exeSize: 127.27 KB (127278 bytes)
MD5: 1e8e59c30347b58e8ab14fbb5b3fef1a
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32\RAL0BBJ4FW
Group: Malware file
Last Updated: December 8, 2010
c:\Commonfiles\xhostr.exe
File name: xhostr.exeSize: 629.24 KB (629248 bytes)
MD5: 90a76bc7e526d6ee789ccc20afb08820
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: c:\Commonfiles
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\djan.exe
File name: djan.exeSize: 249.85 KB (249856 bytes)
MD5: 7551405eca936fe717735827fa8ae39e
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\ini.exe
File name: ini.exeSize: 44.8 KB (44800 bytes)
MD5: aa4a3b0ed5789fe2d2b2b18d35a108e9
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 8, 2010
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.