Malware

Troj/Inject-GMX removal guide

Malware Removal

The Troj/Inject-GMX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Inject-GMX virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

How to determine Troj/Inject-GMX?


File Info:

crc32: 41CA4437
md5: 353f910e81e1c0a9031396620a556dc1
name: upload_file
sha1: 0024ebfaf27632639dcb8e90536bc43f6d1c49cd
sha256: 73be7382d0c307a958973954111725315843e7d089c29fe826a5bc892332381d
sha512: db9cc7a69af507c152d08108e2ac8a6dc1a57392d0123105ba14427ac15b3128c7089fbd66eb86444c6972f44a48635424b3286eeab410e01996533d389b2b2f
ssdeep: 12288:kB/Z3LDx5poUjzEKGsMDTOVeryD+X1pSlRk1/jYGloIZLIyADyJCC5jdmp65dy3y:EImI8hXXhb/ou3detKEIddHl8N
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 1998-2017 Mark Russinovich
InternalName: Process Explorer
FileVersion: 16.21
CompanyName: Sysinternals - www.sysinternals.com
LegalTrademarks: Copyright (C) 1998-2017 Mark Russinovich
ProductName: Process Explorer
ProductVersion: 16.21
FileDescription: Sysinternals Process Explorer
OriginalFilename: Procexp.exe
Translation: 0x0409 0x04e4

Troj/Inject-GMX also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.29406
MicroWorld-eScanTrojan.GenericKD.34696876
FireEyeGeneric.mg.353f910e81e1c0a9
CAT-QuickHealBackdoor.Remcos
Qihoo-360Generic/HEUR/QVM05.1.61AE.Malware.Gen
McAfeeFareit-FZO!353F910E81E1
CylanceUnsafe
SangforMalware
K7AntiVirusVirus ( 7000000f1 )
BitDefenderTrojan.GenericKD.34696876
K7GWVirus ( 7000000f1 )
TrendMicroBackdoor.Win32.REMCOS.USMANEAGHR
BitDefenderThetaGen:NN.ZelphiF.34566.8G2@aOCY43pi
CyrenW32/Bulz.C.gen!Eldorado
SymantecTrojan.Gen.2
ZonerTrojan.Win32.95452
TrendMicro-HouseCallBackdoor.Win32.REMCOS.USMANEAGHR
AvastWin32:PWSX-gen [Trj]
ClamAVWin.Dropper.LokiBot-9775229-0
KasperskyHEUR:Backdoor.Win32.Remcos.gen
AlibabaTrojanDownloader:Win32/Remcos.23f05b9b
NANO-AntivirusTrojan.Win32.Remcos.hyyoov
ViRobotTrojan.Win32.Z.Agent.984024
RisingTrojan.Kryptik!1.C56D (KTSE)
Ad-AwareTrojan.GenericKD.34696876
SophosTroj/Inject-GMX
ComodoMalware@#38clzrfrz2at8
F-SecureTrojan.TR/Crypt.XPACK.luujb
VIPRETrojan.Win32.Generic!BT
InvinceaMal/Generic-R + Troj/Inject-GMX
McAfee-GW-EditionFareit-FZO!353F910E81E1
EmsisoftTrojan.GenericKD.34696876 (B)
IkarusTrojan.Inject
JiangminBackdoor.Remcos.cfk
WebrootW32.Trojan.Gen
AviraTR/Crypt.XPACK.luujb
Antiy-AVLTrojan[Backdoor]/Win32.Remcos
MicrosoftTrojan:Win32/Remcos.RS!MTB
ArcabitTrojan.Generic.D2116EAC
ZoneAlarmHEUR:Backdoor.Win32.Remcos.gen
GDataTrojan.GenericKD.34696876
CynetMalicious (score: 100)
AhnLab-V3Downloader/Win32.Agent.R349910
VBA32BScope.Trojan.Downloader
ALYacTrojan.Agent.FormBook
MAXmalware (ai score=80)
MalwarebytesTrojan.MalPack.DLF
PandaTrj/Agent.PM
APEXMalicious
ESET-NOD32Win32/TrojanDownloader.Delf.DAX
TencentMalware.Win32.Gencirc.11b009bf
YandexTrojan.Igent.bUzCGb.1
FortinetMalicious_Behavior.SB
AVGWin32:PWSX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_80% (W)

How to remove Troj/Inject-GMX?

Troj/Inject-GMX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment