Backdoor

Backdoor:Win32/Xiclog.A removal tips

Malware Removal

The Backdoor:Win32/Xiclog.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Xiclog.A virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Expresses interest in specific running processes
  • The binary likely contains encrypted or compressed data.
  • Checks for the presence of known windows from debuggers and forensic tools
  • The following process appear to have been packed with Themida: test_release.exe
  • Network activity detected but not expressed in API logs
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics

How to determine Backdoor:Win32/Xiclog.A?


File Info:

crc32: 6FC50F30
md5: a5cf1382240eff8732986e1413f3cd95
name: test_release.exe
sha1: 5b1f5a14098295dff586885ba088fbc5ca7daeca
sha256: 12045529a597c7aea667440352099ece292fcf00fe3c7a2b2c55669a3b471bd7
sha512: b2f86ccbfa59161204b3f041b8d4c184f4e0f07519a943085d68fd5e180a13d045f2902b42c96b198e48bc2e49ab27f8c8579a83333fb742c8044cd1b74c138c
ssdeep: 49152:jQDEr75xYBPe/Vm0u309RdDN1t63AleRbBeaKLc:cQYwc03jdhpletAaKLc
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: @ Bittdeffender
InternalName: bidec.dll
FileVersion: 2.99.2.317 2w22222ff
CompanyName: Bittdeffender
ProductName: Bittdeffender Swecurity
ProductVersion: 2.3.2.317 2w22222ff
FileDescription: COM Surrogate
OriginalFilename: bidec.dll
Translation: 0x0409 0x04b0

Backdoor:Win32/Xiclog.A also known as:

BkavW32.HfsAutoB.
MicroWorld-eScanTrojan.GenericKD.40477213
FireEyeGeneric.mg.a5cf1382240eff87
Qihoo-360Win32/Trojan.Spy.e67
ALYacTrojan.GenericKD.40477213
ZillyaTrojan.Downeks.Win32.715
K7AntiVirusTrojan ( 0053c5fa1 )
BitDefenderTrojan.GenericKD.40477213
K7GWTrojan ( 0053c5fa1 )
Cybereasonmalicious.2240ef
BitDefenderThetaGen:NN.ZexaF.34104.lA0aa40utHci
Paloaltogeneric.ml
GDataTrojan.GenericKD.40477213
KasperskyTrojan-Spy.MSIL.Downeks.caz
AlibabaTrojanSpy:MSIL/Downeks.dfb096d2
NANO-AntivirusTrojan.Win32.Downeks.fhsivi
AegisLabTrojan.MSIL.Downeks.4!c
RisingBackdoor.Xiclog!8.E79B (CLOUD)
Ad-AwareTrojan.GenericKD.40477213
EmsisoftTrojan.GenericKD.40477213 (B)
ComodoMalware@#2vhhlvqtdprfx
F-SecureHeuristic.HEUR/AGEN.1047239
DrWebBackDoor.Quasar.1
VIPRETrojan.Win32.Generic!BT
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.PUPXBD.vc
SentinelOneDFI – Suspicious PE
Trapminemalicious.high.ml.score
SophosMal/Generic-S
APEXMalicious
JiangminTrojanSpy.MSIL.zmy
AviraHEUR/AGEN.1047239
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D269A21D
ZoneAlarmTrojan-Spy.MSIL.Downeks.caz
MicrosoftBackdoor:Win32/Xiclog.A
TACHYONTrojan-Spy/W32.Downeks.2277376
AhnLab-V3Malware/Win32.Generic.C2718348
Acronissuspicious
McAfeeArtemis!A5CF1382240E
ESET-NOD32a variant of Win32/Packed.Themida.ASA
TencentMsil.Trojan-spy.Downeks.Lnyd
YandexTrojanSpy.Downeks!
IkarusTrojan-Spy.Agent
eGambitUnsafe.AI_Score_99%
FortinetW32/PossibleThreat
AVGFileRepMalware
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_90% (W)
MaxSecureTrojan.Malware.7175239.susgen

How to remove Backdoor:Win32/Xiclog.A?

Backdoor:Win32/Xiclog.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment