Malware

What is “MonitoringTool:Win32/Winspy”?

Malware Removal

The MonitoringTool:Win32/Winspy is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What MonitoringTool:Win32/Winspy virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Authenticode signature is invalid

How to determine MonitoringTool:Win32/Winspy?


File Info:

name: 7B91D97B9C288DE7B88A.mlw
path: /opt/CAPEv2/storage/binaries/180b47dfe8b8281fa001d490e45c7d3811c10de81f6f4627a3ccc5bb4fbd427f
crc32: DC6CF2B3
md5: 7b91d97b9c288de7b88a3830847c81ff
sha1: fd5cfe81b27abb1384eda8156b85da4efe071e09
sha256: 180b47dfe8b8281fa001d490e45c7d3811c10de81f6f4627a3ccc5bb4fbd427f
sha512: 17d1cf083e5a11ef6e8eb075b4d178d398b6eeb69fa514f6f29c2882d13d9c6d975f6887d69013098d9c89d1fc1a1a27bde9d362a0a03a3ec3e29c44a54e18eb
ssdeep: 768:xxo95zxyJ6o1ywOmUS/18E/vPd2aiI6pd3jDryxnXmUt1BhyZ2fBoNzC6s2Mt6lw:jRp1LOIv3Aeh/oNgMD9jEuRsz
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DBA32A03B7E51991E6522A772DA7CBE44A23FC290F574B5B3250337E1C39E205D27AA3
sha3_384: 9061ae69d4e1969f9dacf711d42b2850a2eea6e7da7c2de2a3117e5290c59aacc7bad5bb9568f44c3fe2c774b6b12716
ep_bytes: 6808154000e8f0ffffff000000000000
timestamp: 2010-10-05 10:52:55

Version Info:

Translation: 0x0409 0x04b0
CompanyName: VistaServices
FileDescription: NTDMServices
ProductName: NTDMServices
FileVersion: 123.23.0078
ProductVersion: 123.23.0078
InternalName: msn
OriginalFilename: msn.exe

MonitoringTool:Win32/Winspy also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Agent.4!c
Elasticmalicious (high confidence)
DrWebTrojan.WinSpy.1070
MicroWorld-eScanGen:Variant.Bulz.776359
FireEyeGen:Variant.Bulz.776359
SkyhighBehavesLike.Win32.PUP.cm
McAfeeArtemis!7B91D97B9C28
Cylanceunsafe
VIPREGen:Variant.Bulz.776359
SangforTrojan.Win32.Agent.aibmz
CrowdStrikewin/malicious_confidence_90% (D)
AlibabaWorm:Win32/vobfus.1030
K7GWSpyware ( 005324591 )
K7AntiVirusSpyware ( 005324591 )
BitDefenderThetaGen:NN.ZevbaF.36802.gm0@auPhaNoi
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Spy.VB.NNZ
APEXMalicious
ClamAVWin.Trojan.Winspy-532
KasperskyTrojan.Win32.Agent.aibmz
BitDefenderGen:Variant.Bulz.776359
NANO-AntivirusTrojan.Win32.WinSpy.edgaqr
AvastWin32:WinSpy-IL [Spy]
TencentWin32.Trojan.Agent.Ojgl
TACHYONTrojan-Spy/W32.VB-WinSpy.102400
EmsisoftGen:Variant.Bulz.776359 (B)
GoogleDetected
F-SecureTrojan.TR/Dropper.Gen
ZillyaTrojan.WinSpy.Win32.3015
Trapminesuspicious.low.ml.score
SophosGeneric Reputation PUA (PUA)
IkarusTrojan-Spy.Win32.WinSpy.ae
GDataGen:Variant.Bulz.776359
JiangminTrojanSpy.WinSpy.bif
VaristW32/SysKeylog.B.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLTrojan[Spy]/Win32.WinSpy
KingsoftWin32.Trojan.Agent.aibmz
XcitiumTrojWare.Win32.TrojanSpy.WinSpy.~FFF@2xc9jv
ArcabitTrojan.Bulz.DBD8A7
ViRobotTrojan.Win32.A.WinSpy.102400.C
ZoneAlarmTrojan.Win32.Agent.aibmz
MicrosoftMonitoringTool:Win32/Winspy
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win.Winspy.R487498
ALYacGen:Variant.Bulz.776359
MAXmalware (ai score=89)
MalwarebytesGeneric.Malware.AI.DDS
PandaGeneric Malware
RisingHackTool.Winspy!8.146B9 (TFE:5:OCMuZ0HxajK)
YandexTrojan.GenAsa!7GhWVvpZ72o
MaxSecureTrojan.Malware.300983.susgen
AVGWin32:WinSpy-IL [Spy]
Cybereasonmalicious.b9c288
DeepInstinctMALICIOUS

How to remove MonitoringTool:Win32/Winspy?

MonitoringTool:Win32/Winspy removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment