Spy

About “Spyware.PredatorTheThief” infection

Malware Removal

The Spyware.PredatorTheThief is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Spyware.PredatorTheThief virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Executed a process and injected code into it, probably while unpacking
  • Steals private information from local Internet browsers
  • Attempts to modify proxy settings
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Spyware.PredatorTheThief?


File Info:

crc32: 81169D63
md5: 0f0f27f768b6ba775a06315e82aa89d1
name: pred222.exe
sha1: e888c39c6161c8f623429525974e14565103aa28
sha256: b964156b04b4789f2cac8d39c42af2142fff306c243b18faaaa1d7e45a5c3c07
sha512: 9d615a943b0f2a0efb38a6ec350fcc291b9f30de4deb46bfa3e2cd01a928db15f90c0e3fae521924ee9de866572e41605fc3871d48c420e7cc840d9aa5643ea3
ssdeep: 12288:wH2SzoDSefUDTJUPLve225zTydHNnuTd2RL/BbrBfG:w9efUDTSLfHNnUd2BBlf
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

LegalCopyright: Cisco Systems (c). All rights reserved.
CompanyName: Cisco Systems
FileDescription: Browser Sitecontent Spcdcenabletable Anymore Erosion
LegalTrademarks: Cisco Systems (c). All rights reserved.
ProductName: SeesphsFsck
ProductVersion: 3.2.8.4
PrivateBuild: 3.2.8.4
OriginalFilename: SeesphsFsck.exe
Translation: 0x0409 0x04b0

Spyware.PredatorTheThief also known as:

MicroWorld-eScanTrojan.GenericKD.32682455
CAT-QuickHealTrojanpws.Predator
McAfeeRDN/Generic.dx
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 0055aef31 )
AlibabaTrojanPSW:Win32/Predator.ec3336aa
K7GWTrojan ( 0055aef31 )
Cybereasonmalicious.c6161c
ArcabitTrojan.Generic.D1F2B1D7
Invinceaheuristic
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GXYW
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Agent-7374512-0
KasperskyTrojan-PSW.Win32.Predator.dwt
BitDefenderTrojan.GenericKD.32682455
NANO-AntivirusTrojan.Win32.Predator.ggzqic
Endgamemalicious (moderate confidence)
ComodoMalware@#26wtwyk6h8vzj
DrWebTrojan.PWS.Siggen2.38096
TrendMicroTROJ_GEN.R020C0PK819
McAfee-GW-EditionRDN/Generic.dx
FireEyeTrojan.GenericKD.32682455
SophosMal/Generic-S
IkarusTrojan-Ransom.GandCrab
CyrenW32/Trojan.OTMN-1500
JiangminTrojan.PSW.Predator.aef
WebrootW32.Trojan.Gen
FortinetW32/Predator.DWT!tr.pws
MicrosoftTrojan:Win32/Tiggre!plock
ZoneAlarmTrojan-PSW.Win32.Predator.dwt
AhnLab-V3Trojan/Win32.Gandcrab.C3548330
Acronissuspicious
ALYacTrojan.Agent.Casur
Ad-AwareTrojan.GenericKD.32682455
MalwarebytesSpyware.PredatorTheThief
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R020C0PK819
SentinelOneDFI – Malicious PE
GDataTrojan.GenericKD.32682455
BitDefenderThetaGen:NN.ZexaF.32515.HmKfaqFcQ2mi
AVGWin32:Trojan-gen
AvastWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_80% (W)
Qihoo-360HEUR/QVM11.1.05C7.Malware.Gen

How to remove Spyware.PredatorTheThief?

Spyware.PredatorTheThief removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment