Spy Trojan

Trojan-Spy.Win32.Stealer.apdq malicious file

Malware Removal

The Trojan-Spy.Win32.Stealer.apdq is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.apdq virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.apdq?


File Info:

name: E255E6B1AAE7EB7406FB.mlw
path: /opt/CAPEv2/storage/binaries/77aaecbdc75045a5aa3a7202cf5eadd5815cc1d05576594029e263f9dc6fdad3
crc32: 1AA59C95
md5: e255e6b1aae7eb7406fb221db4eef8e5
sha1: d9a7acba0fa6d616524638dd34564087a004249c
sha256: 77aaecbdc75045a5aa3a7202cf5eadd5815cc1d05576594029e263f9dc6fdad3
sha512: c1e8a25fb6ec4b7468a6d8a575a04d72b93e95600c6e5e7be0bed7aaafd6ed866218ddbfd909bbe1bb424b4ae4a96b24b6b526009c01da19e9918009380ce224
ssdeep: 98304:H+23hVN7M4EJxpdE5G/HUmh8RII1s3sKaIm3Fkx+Rb1xnADyk+x61MgmZLsyZXRE:eMhFEJ3u5uth8RC3faIoFkURjA/86ZmK
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1A146237767380008C6FAD83D9837BDF531FA4E674B81A87475D93ACA26369E1D203D4A
sha3_384: e6186887f04b17f3c8563068d7120f814551c2802d939bc044bf098b4a62d801dd52a8840499e5c2248fd2fb2c7fd880
ep_bytes: 68ddaa3080e8297c0500ffe3f53be3f7
timestamp: 2012-07-13 22:47:16

Version Info:

CompanyName: Valve Corporation
FileDescription: gameoverlayui.exe
FileVersion: 3, 0, 0, 1
InternalName: gameoverlayui.exe
LegalCopyright: Copyright (C) 2009 Valve Corporation
OriginalFilename: gameoverlayui.exe
ProductName: Steam
ProductVersion: 3, 0, 0, 1
Translation: 0x0409 0x04b0

Trojan-Spy.Win32.Stealer.apdq also known as:

LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
McAfeeArtemis!E255E6B1AAE7
CylanceUnsafe
Cybereasonmalicious.a0fa6d
ESET-NOD32a variant of Win32/Packed.VMProtect.YU
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Stealer.apdq
BitDefenderTrojan.GenericKD.38227144
MicroWorld-eScanTrojan.GenericKD.38227144
AvastFileRepMalware
DrWebTrojan.PWS.Steam.23357
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.e255e6b1aae7eb74
EmsisoftTrojan.GenericKD.38227144 (B)
IkarusTrojan.Win32.VMProtect
AviraHEUR/AGEN.1145256
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataMSIL.Trojan-Stealer.Redline.696ECA
AhnLab-V3HackTool/Win32.Agent.R342140
TrendMicro-HouseCallTROJ_GEN.R002H07L821
RisingMalware.Heuristic!ET#81% (RDMK:cmRtazrkRULz9Y8i1IbE5ZPo4pfn)
YandexTrojan.GenAsa!u0gH+a0TujA
eGambitPE.Heur.InvalidSig
FortinetW32/VMProtect.JG!tr
BitDefenderThetaGen:NN.ZexaE.34062.@B2@aC@qnxmi
AVGFileRepMalware
CrowdStrikewin/malicious_confidence_80% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Trojan-Spy.Win32.Stealer.apdq?

Trojan-Spy.Win32.Stealer.apdq removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment