Trojan

How to remove “Trojan.Heur.GC.bmLfqf0E4MjGY”?

Malware Removal

The Trojan.Heur.GC.bmLfqf0E4MjGY is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Heur.GC.bmLfqf0E4MjGY virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality

How to determine Trojan.Heur.GC.bmLfqf0E4MjGY?


File Info:

name: BE8704CD0076BB1CF25E.mlw
path: /opt/CAPEv2/storage/binaries/e595f6c29c2ecbf4fb5ed6f5d785024d131e20cd1f8b1e80196968a4251b6a7e
crc32: EED9A3C1
md5: be8704cd0076bb1cf25e916880f7fa41
sha1: 0b7ab4eee8c266465371efe22b43e3cf699f2421
sha256: e595f6c29c2ecbf4fb5ed6f5d785024d131e20cd1f8b1e80196968a4251b6a7e
sha512: 941ce3b2cc83701fb546ce2c4122391464690e7f2a810deeb22f4532e421fcea34f0e6a117cc6e05415767f592e080e883407e7c0a589c1840e39746c4aafb69
ssdeep: 384:MP3E7Hh1GFNrEz3VHHsqxaNT0V63kIrCSl5ZytSq3:MPU7H+4DVHt8W63k+Cm5m
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19DA2BF93F296E952C99601320027CB724A597C043FE6CBB62BB4396DFCB52486C0DB60
sha3_384: a9adcfd6233e791489d01627e3a3aedfb09229e98a10f0397b795f6888fd2e6c0597b1948852649315574506109a99b2
ep_bytes: 60be15f040008dbeeb1fffff5783cdff
timestamp: 2008-04-07 00:50:58

Version Info:

CompanyName: iperlibero
FileDescription: spunto
FileVersion: 1,0,0,0
LegalCopyright: concetto pensato nasce disegnato scritto
Translation: 0x0000 0x0000

Trojan.Heur.GC.bmLfqf0E4MjGY also known as:

Elasticmalicious (high confidence)
CAT-QuickHealTrojan.GenericPMF.S1625602
ALYacGen:Trojan.Heur.GC.bmLfqf0E4MjGY
CylanceUnsafe
BitDefenderGen:Trojan.Heur.GC.bmLfqf0E4MjGY
Cybereasonmalicious.d0076b
VirITTrojan.Win32.Generic.BEEV
CyrenW32/KillWin.A.gen!Eldorado
APEXMalicious
ClamAVWin.Malware.Killwin-7104182-0
NANO-AntivirusTrojan.Win32.Qhost.ckprvw
MicroWorld-eScanGen:Trojan.Heur.GC.bmLfqf0E4MjGY
RisingMalware.Heuristic!ET#95% (RDMK:cmRtazpvOmSZICrwFdOeNI3BLL2u)
Ad-AwareGen:Trojan.Heur.GC.bmLfqf0E4MjGY
EmsisoftGen:Trojan.Heur.GC.bmLfqf0E4MjGY (B)
ComodoTrojWare.Win32.TrojanDropper.Agent.~ZCA@go3n
McAfee-GW-EditionBehavesLike.Win32.Downloader.mc
FireEyeGeneric.mg.be8704cd0076bb1c
SophosGeneric ML PUA (PUA)
JiangminTrojan/BAT.KillWin.a
MAXmalware (ai score=86)
Antiy-AVLTrojan/Generic.ASMalwS.9784FC
KingsoftHeur.SSC.1302533.0010.(kcloud)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ArcabitTrojan.Heur.GC.bmLfqf0E4MjGY
GDataGen:Trojan.Heur.GC.bmLfqf0E4MjGY
VBA32Trojan.BAT.KillAV
TencentMalware.Win32.Gencirc.10b3d552
YandexTrojan.GenAsa!Q+O4UmmrDn8
IkarusTrojan.SuspectCRC
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/KillWin.BQ!tr
BitDefenderThetaAI:Packer.3F640AED20

How to remove Trojan.Heur.GC.bmLfqf0E4MjGY?

Trojan.Heur.GC.bmLfqf0E4MjGY removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment