Backdoor

About “Backdoor.Win32.Androm.tqlo” infection

Malware Removal

The Backdoor.Win32.Androm.tqlo is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Androm.tqlo virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (254 unique times)
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Likely virus infection of existing system binary
  • Anomalous binary characteristics

How to determine Backdoor.Win32.Androm.tqlo?


File Info:

crc32: DCA218A5
md5: 1ee37f16676ca70db5ef05550c74a51d
name: rvdhtffsd.exe
sha1: fb8778db0ad995d281e617bfae5c2a004af0d3ff
sha256: 0369b316850229bb110d6319300e81cb5529f0d1e00d07d0245bf02dd78965f6
sha512: e752ceb11b5d3884a28ebdca9735bc5be30a770317ddc0e37d5dc49c2399ab97404a9be7100a719734d97ceaa9e2bcb94573f82652a3f915e4f947e2898ac07c
ssdeep: 1536:AFCdAhJLGy9ADTvYdKTFMywkYRVdV9MbG5qnqMHbpZQteKPOb5mc2Q5ED:AFdP3ewoJKV39pqqcQt9o5KD
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) half-timer 2019
InternalName: gaincome.exe
FileVersion: 1.3.0.5
CompanyName: Reamstown
ProductName: gaincome
ProductVersion: 7.4.5.2
FileDescription: arrowroot
OriginalFilename: fader.exe
Translation: 0x0409 0x04b0

Backdoor.Win32.Androm.tqlo also known as:

MicroWorld-eScanTrojan.GenericKD.32893088
FireEyeGeneric.mg.1ee37f16676ca70d
Qihoo-360HEUR/QVM19.1.4133.Malware.Gen
McAfeeArtemis!1EE37F16676C
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Androm.m!c
SangforMalware
K7AntiVirusTrojan ( 0055e13b1 )
BitDefenderTrojan.GenericKD.32893088
K7GWTrojan ( 0055e13b1 )
Cybereasonmalicious.b0ad99
BitDefenderThetaGen:NN.ZexaF.33558.fy3@amaHRKni
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GZDN
AvastWin32:Trojan-gen
GDataTrojan.GenericKD.32893088
KasperskyBackdoor.Win32.Androm.tqlo
AlibabaTrojan:Win32/Kryptik.4950d7c3
RisingTrojan.Generic@ML.96 (RDML:qgq+rw+c0YyDngEkMbJ+bA)
Ad-AwareTrojan.GenericKD.32893088
EmsisoftTrojan.GenericKD.32893088 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.Inject3.32140
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Pate.mc
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
APEXMalicious
JiangminTrojanSpy.MSIL.alnm
AviraTR/Crypt.XPACK.Gen
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1F5E8A0
ZoneAlarmBackdoor.Win32.Androm.tqlo
MicrosoftTrojan:Win32/Wacatac.B!ml
SentinelOneDFI – Malicious PE
Acronissuspicious
VBA32BScope.Trojan.Nanocore
ALYacGen:Variant.Razy.596123
MalwarebytesTrojan.MalPack.RND
PandaTrj/CI.A
MAXmalware (ai score=81)
FortinetW32/Kryptik.GZDN!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Backdoor.Win32.Androm.tqlo?

Backdoor.Win32.Androm.tqlo removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment