Adware

Adware.Graftor.46174 removal instruction

Malware Removal

The Adware.Graftor.46174 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Adware.Graftor.46174 virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid

How to determine Adware.Graftor.46174?


File Info:

name: C35757855A0494172B2E.mlw
path: /opt/CAPEv2/storage/binaries/903a271618c2e7f8c16b5c2c14d535734b0bcf6066c1fd8853124ece6115e798
crc32: DF5DC8F1
md5: c35757855a0494172b2e81c1b05abd89
sha1: ceeb82886e9edb0fdd48431dd9def00c56474ea7
sha256: 903a271618c2e7f8c16b5c2c14d535734b0bcf6066c1fd8853124ece6115e798
sha512: c431507907b62317d532df73ec19882f37f301f4b94777b15a4ed12bd23108523d473e033a0537aa80871ec432b414a4da28f0256b91986bde5c6a89de114ff8
ssdeep: 3072:zb09cEup0nm1FdupUerclw16blcsegddEOoU1qkrQX60eyc/R+a6ZPUa:LEi0mb8pUkc26qseRO9qkre6IZPUa
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18014E020F5A2C476E0558070086C4B565A3CFC7107A455D3F3F89D6D7ABAAE39733A8B
sha3_384: 10dd5abc77f64f6ee04d4db6e70aad9c246096877393e9a08feaafec87e33aa2d77230ed677d7e7659416a48f553f115
ep_bytes: 6a1868286a4100e8661d0000bf940000
timestamp: 2011-08-12 06:30:21

Version Info:

0: [No Data]

Adware.Graftor.46174 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Adload.lkH7
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader4.48240
MicroWorld-eScanGen:Variant.Adware.Graftor.46174
FireEyeGeneric.mg.c35757855a049417
SkyhighBehavesLike.Win32.Ransomware.dc
McAfeeGenericRXCP-OA!C35757855A04
Cylanceunsafe
ZillyaAdware.WSearch.Win32.1309
SangforSuspicious.Win32.Save.ins
K7AntiVirusRiskware ( 0040eff71 )
AlibabaAdWare:Win32/WSearch.09c04ff5
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_70% (D)
ArcabitTrojan.Adware.Graftor.DB45E
BitDefenderThetaGen:NN.ZexaF.36744.mmZ@aq4IXBf
VirITTrojan.Win32.Generic.CZC
SymantecAdware.Rugo
ESET-NOD32a variant of Win32/Adware.WSearch.AU
APEXMalicious
ClamAVWin.Trojan.Adload-2869
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Adware.Graftor.46174
NANO-AntivirusTrojan.Win32.WSearch.dgxfm
AvastWin32:Adload-MK [Trj]
TencentTrojan.Win32.Adload.b
EmsisoftGen:Variant.Adware.Graftor.46174 (B)
GoogleDetected
F-SecureTrojan.TR/Drop.Agent.blanh
BaiduWin32.Trojan.Agent.dl
VIPREGen:Variant.Adware.Graftor.46174
TrendMicroTROJ_SMALL.SM3
SophosRugo (PUA)
IkarusAdWare.Win32.Rugo
JiangminTrojan/Qhost.bzx
WebrootW32.Trojan.Dropper.Gen
VaristW32/AdLoad.O.gen!Eldorado
AviraTR/Drop.Agent.blanh
Antiy-AVLTrojan[Downloader]/Win32.Adload
KingsoftWin32.Trojan.Generic.a
XcitiumApplicUnsaf.Win32.AdWare.WSearch.AU@2i00lv
MicrosoftProgram:Win32/Wacapew.C!ml
ViRobotTrojan.Win32.Downloader.Gen.D
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Adware.Graftor.46174
CynetMalicious (score: 100)
AhnLab-V3Downloader/Win32.Adload.R1796
Acronissuspicious
ALYacGen:Variant.Adware.Graftor.46174
MAXmalware (ai score=100)
VBA32Adware.Rugo.3
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_SMALL.SM3
RisingTrojan.Win32.Fednu.aqx (CLASSIC)
YandexAdware.WSearch!v4/L22z1P2g
SentinelOneStatic AI – Malicious PE
FortinetW32/Adload.ATUF!tr.dldr
AVGWin32:Adload-MK [Trj]
Cybereasonmalicious.86e9ed
DeepInstinctMALICIOUS

How to remove Adware.Graftor.46174?

Adware.Graftor.46174 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment