Backdoor

Backdoor.Win32.Pedex.a removal instruction

Malware Removal

The Backdoor.Win32.Pedex.a is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Pedex.a virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with ASPack
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Anomalous binary characteristics

How to determine Backdoor.Win32.Pedex.a?


File Info:

name: AF2F19283499A0A1521D.mlw
path: /opt/CAPEv2/storage/binaries/ccd5c541b98a623e302de4ada8e0f492f6c90fa50e83fc23ead2442f893d229e
crc32: 6C60EA84
md5: af2f19283499a0a1521ddf9fce8ff0e3
sha1: 7e9a2351db153e7d53226fdaa1e2d3bf3ad735ea
sha256: ccd5c541b98a623e302de4ada8e0f492f6c90fa50e83fc23ead2442f893d229e
sha512: 5ec98b8cd45da50758dfb9e3b6ae07c81340ef63306b5c8aaf3408df12d46b06a2af1b884bef2bec9d7e3a84e2b64b04109a92930400e0f363853524816b6055
ssdeep: 6144:ihjU64PF37QvqGAvWwkju84DHaApCf+bd64PF37QvqGAvWwkju84DHaa:iyzPdcS5kjuPzaAM2BzPdcS5kjuPzaa
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C09412965D806EC7D5A1363226A3BEF4ED7ECF4FC5212F0ACBB58425AD075346D27280
sha3_384: 1192decaf8141e7bdfc3ebaaaedcf16117da757f80807f74d7b42ef06b90349add3ce3fd51eae1afb0a1598d8e3b3b06
ep_bytes: 60e803000000e9eb045d4555c3e80100
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Backdoor.Win32.Pedex.a also known as:

BkavW32.OverlayASPDPM.PE
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.40904609
FireEyeGeneric.mg.af2f19283499a0a1
CAT-QuickHealTrojan.GenericPMF.S17467775
ALYacTrojan.GenericKD.40904609
CylanceUnsafe
K7AntiVirusBackdoor ( 0040f0021 )
BitDefenderTrojan.GenericKD.40904609
K7GWBackdoor ( 0040f0021 )
ArcabitTrojan.Generic.D27027A1
CyrenW32/Pedex.NEMA-1931
SymantecW32.HLLP.Ped
ESET-NOD32Win32/HLLP.Ped.A
APEXMalicious
ClamAVWin.Trojan.Pedex-9786617-0
KasperskyBackdoor.Win32.Pedex.a
NANO-AntivirusTrojan.Win32.Pedex.eetuzz
Ad-AwareTrojan.GenericKD.40904609
EmsisoftTrojan.GenericKD.40904609 (B)
ComodoWin32.HLLP.Ped.A@4doo
DrWebWin32.HLLP.Ped
ZillyaTrojan.Black.Win32.53502
TrendMicroBKDR_PEDEX.DAM
SophosML/PE-A + Troj/Agent-BAFW
SentinelOneStatic AI – Malicious PE
JiangminBackdoor/Pedex.a
AviraTR/ATRAPS.Gen
MAXmalware (ai score=86)
Antiy-AVLTrojan/Generic.ASMalwS.30BCF
SUPERAntiSpywareBackdoor.Pedex/Variant
GDataTrojan.GenericKD.40904609
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Bancos.C160396
Acronissuspicious
VBA32Backdoor.Pedex
MalwarebytesBackdoor.Pedex
PandaTrj/Genetic.gen
TrendMicro-HouseCallBKDR_PEDEX.DAM
TencentTrojan.Win32.BitCoinMiner.la
YandexTrojan.GenAsa!r9cRaAEQtmg
IkarusBackdoor.Win32.Pedex
eGambitUnsafe.AI_Score_99%
FortinetW32/Pedex.ASPM!tr
BitDefenderThetaGen:NN.ZelphiF.34294.zWZbaeAPqIlc
AVGWin32:Malware-gen
CrowdStrikewin/malicious_confidence_80% (D)
MaxSecureTrojan.Malware.300983.susgen

How to remove Backdoor.Win32.Pedex.a?

Backdoor.Win32.Pedex.a removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment