Spy Trojan

Trojan-Spy.Win32.Stealer.wgr removal

Malware Removal

The Trojan-Spy.Win32.Stealer.wgr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.wgr virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Unconventionial language used in binary resources: Serbian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Steals private information from local Internet browsers
  • Collects information about installed applications
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
kypersaw52.top

How to determine Trojan-Spy.Win32.Stealer.wgr?


File Info:

crc32: 4BF51119
md5: d7f12a7017ae6a3ff51a4a3d31e1c325
name: D7F12A7017AE6A3FF51A4A3D31E1C325.mlw
sha1: f79454fe0ea40f8be0f6606e78a907fbaa4248a2
sha256: fccd7d5301e46046f199343583a436d0869f49ae668aeedd41b76d75c403701e
sha512: 1bbc267abe66c461939921c5d932d8166c0ff6f41f9ebd1ecbd952a436f6f0f47e20166e75374832ab55784f2c55f31aec1f8d46bc6198efbde01c6af9357d96
ssdeep: 12288:POWHqCNt/KLTR8Iza9mRyUID9Ya7m+z0S4tk5r222PYpy7:pHZtCLTR8H9pD9Ya7m+oSv5r22oY0
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

InternalName: triwilbifor.occ
FileVersion: 6.26.341
Copyright: Copyrighz (C) 2020, wodkafull
ProductVersion: 1.10.27
TranslationUsa: 0x0173 0x00dc

Trojan-Spy.Win32.Stealer.wgr also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen11.58138
MicroWorld-eScanTrojan.GenericKD.36078574
Qihoo-360Generic/HEUR/QVM11.1.89BB.Malware.Gen
ALYacTrojan.GenericKD.36078574
MalwarebytesTrojan.MalPack.GS
SangforMalware
K7AntiVirusTrojan ( 00575f861 )
AlibabaTrojan:Win32/Kryptik.73e78511
K7GWTrojan ( 00575f861 )
Cybereasonmalicious.e0ea40
BitDefenderThetaGen:NN.ZexaF.34760.MmKfaixMslmG
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Stealer.wgr
BitDefenderTrojan.GenericKD.36078574
AvastWin32:TrojanX-gen [Trj]
Ad-AwareTrojan.GenericKD.36078574
EmsisoftTrojan.GenericKD.36078574 (B)
ComodoMalware@#36qipjqw2nbvs
F-SecureTrojan.TR/AD.PredatorThief.bcmhm
McAfee-GW-EditionBehavesLike.Win32.Trojan.jc
FireEyeGeneric.mg.d7f12a7017ae6a3f
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
WebrootW32.Trojan.Gen
AviraTR/AD.PredatorThief.bcmhm
KingsoftWin32.Troj.Stealer.w.(kcloud)
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D22683EE
AegisLabTrojan.Multi.Generic.4!c
ZoneAlarmTrojan-Spy.Win32.Stealer.wgr
GDataTrojan.GenericKD.36078574
CynetMalicious (score: 100)
Acronissuspicious
MAXmalware (ai score=84)
CylanceUnsafe
ESET-NOD32a variant of Win32/Kryptik.HIRF
IkarusTrojan.Win32.Crypt
eGambitUnsafe.AI_Score_98%
FortinetW32/Kryptik.HIRY!tr
AVGWin32:TrojanX-gen [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan-Spy.Win32.Stealer.wgr?

Trojan-Spy.Win32.Stealer.wgr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment