Spy Trojan

Trojan-Spy.Win32.Stealer.aqdw removal instruction

Malware Removal

The Trojan-Spy.Win32.Stealer.aqdw is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.aqdw virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Stealer.aqdw?


File Info:

name: 6A5899654FDA09F452E6.mlw
path: /opt/CAPEv2/storage/binaries/0a46e5e1828bb6d3b61c1cb2e07bbe725a8dfe380aa0e64603912a8281dcb4ef
crc32: 30591ACB
md5: 6a5899654fda09f452e69939d8231917
sha1: c56c21ea8d6c0d16362ec7ffc11be1849fa41e51
sha256: 0a46e5e1828bb6d3b61c1cb2e07bbe725a8dfe380aa0e64603912a8281dcb4ef
sha512: bdba0b60cc964c34f4e0b125c796f5895bf33c34cc9105cf9af9964fa5a3299a36cffeda01dc34e2bfe910645a52eb915b7356a5caa8595bbe9b4f8d7468c1b3
ssdeep: 98304:ursoVWjfbOVXHb3Cx6EmSN6DimncWiT5BJzKuIAMeaN:B3bbOVuzwcfJcHN
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1BA662367163A008AF082CC368627FEF532F95F674B83BC7944C9BDD63532691B249A53
sha3_384: a275fa8aea59df0d77ffd68f256f393bebeeebfa8891e4b81145095adbe7938cbae6472b91fcd6eb0c03ddc0c0ef71b6
ep_bytes: 68ead8cb00e8df97feff8b0fc0ea55e9
timestamp: 2012-07-13 22:47:16

Version Info:

Comments: Zoom
CompanyName: Zoom Video Communications, Inc.
FileDescription: Zoom Meetings
FileVersion: 5,8,7,2058
InternalName: Zoom
LegalCopyright: © Zoom Video Communications, Inc. All rights reserved.
LegalTrademarks: Zoom
OriginalFilename: Zoom
ProductName: Zoom
ProductVersion: 5,8,7,2058
Translation: 0x0409 0x04b0

Trojan-Spy.Win32.Stealer.aqdw also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.38258389
FireEyeGeneric.mg.6a5899654fda09f4
ALYacTrojan.GenericKD.38258389
SangforTrojan.Win32.Sabsik.FL
AlibabaTrojanSpy:Win32/Stealer.817dc1a1
Cybereasonmalicious.a8d6c0
BitDefenderThetaGen:NN.ZexaF.34084.@B3@aKjBCkni
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.VMProtect.YU
AvastWin32:Trojan-gen
KasperskyTrojan-Spy.Win32.Stealer.aqdw
BitDefenderTrojan.GenericKD.38258389
Ad-AwareTrojan.GenericKD.38258389
EmsisoftTrojan.GenericKD.38258389 (B)
DrWebTrojan.PWS.Siggen3.8279
TrendMicroTROJ_GEN.R023C0WLF21
McAfee-GW-EditionArtemis!Trojan
SophosMal/Generic-S
Paloaltogeneric.ml
GDataTrojan.GenericKD.38258389
AviraADWARE/Adware.Gen
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3HackTool/Win32.Agent.R342140
McAfeeArtemis!6A5899654FDA
MAXmalware (ai score=84)
CylanceUnsafe
TrendMicro-HouseCallTROJ_GEN.R023C0WLF21
YandexTrojan.GenAsa!u0gH+a0TujA
eGambitPE.Heur.InvalidSig
FortinetW32/VMProtect.JG!tr
AVGWin32:Trojan-gen

How to remove Trojan-Spy.Win32.Stealer.aqdw?

Trojan-Spy.Win32.Stealer.aqdw removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment