Backdoor

Backdoor.Win32.Androm.twku removal instruction

Malware Removal

The Backdoor.Win32.Androm.twku is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Androm.twku virus can do?

  • Executable code extraction
  • Creates RWX memory
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
cpf-th.com

How to determine Backdoor.Win32.Androm.twku?


File Info:

crc32: 5BF29867
md5: 2631e233b4760ad7ee6290c11b8b95bc
name: regasm.exe
sha1: 026e3903a7e962ed5f9713e0e4ab8ad86ad08f4f
sha256: fb3dc2d17bcba56da5806edb0d8cb2977fae05a36d1947618e7168ac63bf92af
sha512: 67a295eb2e1b4b0ea6ce7685bf848e4e03bb28faa4eea79c5735f2863beda72091f70d035fad63edfde340229cb14b0eac2fb253abed2ff9eea25708d7228465
ssdeep: 24576:N0uCCgi+wkXBdt7hvlfFdMQ2g08zyWQMq4yR0Fc0ZDcKUBK5PA7wIQyP+1P6oP1Z:ZyaQ2nvLZ7wIQAqP7
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9Adobe Systems Incorporated. All rights reserved.
InternalName: Hardware Villages
CompanyName: Adobe Systems Incorporated
LegalTrademarks: Copyright xa9Adobe Systems Incorporated. All rights reserved.
Comments: Timings Lecturers Immigrant Bazooka
ProductName: Hardware Villages
ProductVersion: 2.6.5.6
FileDescription: Timings Lecturers Immigrant Bazooka
OriginalFilename: Hardware Villages
Translation: 0x0409 0x04b0

Backdoor.Win32.Androm.twku also known as:

BkavW32.AIDetectVM.malware2
MicroWorld-eScanTrojan.GenericKD.33540375
McAfeeArtemis!2631E233B476
CylanceUnsafe
AegisLabTrojan.Multi.Generic.4!c
K7AntiVirusPassword-Stealer ( 004d5a661 )
BitDefenderTrojan.GenericKD.33540375
K7GWPassword-Stealer ( 004d5a661 )
Invinceaheuristic
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/PSW.Fareit.L
APEXMalicious
Paloaltogeneric.ml
KasperskyBackdoor.Win32.Androm.twku
AlibabaBackdoor:Win32/Androm.1363592a
AvastWin32:Malware-gen
TencentWin32.Backdoor.Androm.Hphx
Ad-AwareTrojan.GenericKD.33540375
EmsisoftTrojan.GenericKD.33540375 (B)
F-SecureTrojan.TR/AD.LokiBot.bfscs
DrWebTrojan.Siggen9.20529
TrendMicroMal_HPGen-37b
McAfee-GW-EditionBehavesLike.Win32.Ransom.th
FortinetPossibleThreat.MU
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.2631e233b4760ad7
SophosMal/Generic-S
IkarusTrojan-PSW.Fareit
AviraTR/AD.LokiBot.bfscs
MAXmalware (ai score=83)
Antiy-AVLTrojan[Backdoor]/Win32.Androm
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1FFC917
ZoneAlarmBackdoor.Win32.Androm.twku
MicrosoftTrojan:Win32/Tiggre!rfn
BitDefenderThetaGen:NN.ZexaF.34100.rr0@au04NImi
ALYacSpyware.LokiBot
MalwarebytesSpyware.LokiBot
TrendMicro-HouseCallMal_HPGen-37b
RisingBackdoor.Androm!8.113 (CLOUD)
SentinelOneDFI – Suspicious PE
eGambitUnsafe.AI_Score_99%
GDataTrojan.GenericKD.33540375
AVGWin32:Malware-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_60% (W)

How to remove Backdoor.Win32.Androm.twku?

Backdoor.Win32.Androm.twku removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment