Categories: Trojan

Trojan.Waski.S28288290 removal instruction

The Trojan.Waski.S28288290 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Waski.S28288290 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Authenticode signature is invalid

How to determine Trojan.Waski.S28288290?


File Info:

name: 8F4A908C505DFCB95AAC.mlwpath: /opt/CAPEv2/storage/binaries/bfb65576facebd422faf7e3e54467d0ecf76458f3e499bbbcec59590b197e47ecrc32: 18E0E70Cmd5: 8f4a908c505dfcb95aac64722c09ca8fsha1: 525f92b0b51115d10cbdae6c61c002665ac00b6asha256: bfb65576facebd422faf7e3e54467d0ecf76458f3e499bbbcec59590b197e47esha512: d17689dd8769b983c80bbbe5fa2ef9a9cc602a67f9f47b53a85c1542d1dfb4109ab130a33c4a9357f0643b65f42986b89b444094690908282eed0463ed1ac79cssdeep: 384:kK1MluQWRREHZlgbPpiimrNcPxuYOx9bjdh:kK1MghRSlkhiim5qxuYIX7type: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T11F72E23C9ED55577E3BBCAB6C5F645CAFA25B02339029C1D80DB43850823F96ADE190Esha3_384: c413e8dece25535d93694acaabc2e0f928c4cfb04cecc4fc94d792beba87675048817b749e32d76c22f14ba73bd0528dep_bytes: 81ec3008000053555633db578beb5389timestamp: 2014-05-15 13:24:22

Version Info:

0: [No Data]

Trojan.Waski.S28288290 also known as:

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Waski.4!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Upatre-9982428-0
CAT-QuickHeal Trojan.Waski.S28288290
Skyhigh BehavesLike.Win32.Generic.lz
ALYac Trojan.Ppatre.Gen.1
Cylance unsafe
Zillya Downloader.Waski.Win32.59499
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 0049a3451 )
BitDefender Trojan.Ppatre.Gen.1
K7GW Trojan-Downloader ( 0049a3451 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Ppatre.Gen.1
VirIT Trojan.Win32.Upatre.BX
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 Win32/TrojanDownloader.Waski.E
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Malware:Win32/km_2c98.None
NANO-Antivirus Trojan.Win32.Waski.jueqyd
MicroWorld-eScan Trojan.Ppatre.Gen.1
Tencent Trojan-Downloader.Win32.Upatre.ht
Sophos Mal/EncPk-ACO
F-Secure Trojan.TR/Dropper.Gen
DrWeb Trojan.DownLoader.origin
VIPRE Trojan.Ppatre.Gen.1
TrendMicro TROJ_GEN.R002C0DAM24
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.8f4a908c505dfcb9
Emsisoft Trojan.Ppatre.Gen.1 (B)
SentinelOne Static AI – Malicious PE
Jiangmin TrojanDownloader.Upatre.aofg
Google Detected
Avira TR/Dropper.Gen
Antiy-AVL Trojan/Win32.Waski.a
Kingsoft malware.kb.a.1000
Microsoft TrojanDownloader:Win32/Waski.AW!MTB
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Win32.Trojan-Downloader.Upatre.BJ
Varist W32/Upatre.PK.gen!Eldorado
AhnLab-V3 Trojan/Win.DownLoader.R567662
Acronis suspicious
McAfee Artemis!8F4A908C505D
MAX malware (ai score=89)
DeepInstinct MALICIOUS
VBA32 SScope.Trojan-Downloader.1454
Malwarebytes Waski.Trojan.Downloader.DDS
Panda Trj/Genetic.gen
TrendMicro-HouseCall TROJ_GEN.R002C0DAM24
Rising Downloader.Waski!8.184 (TFE:2:DeqlpRkc9eH)
Yandex Trojan.GenAsa!zfalv5UzsQI
Ikarus Trojan-Downloader.Win32.Waski
MaxSecure Trojan.Upatre.Gen
Fortinet W32/EncPk.ACO!tr
BitDefenderTheta Gen:NN.ZexaF.36744.buY@aeIRmDbi
AVG Win32:TrojanX-gen [Trj]
Cybereason malicious.0b5111
Avast Win32:TrojanX-gen [Trj]

How to remove Trojan.Waski.S28288290?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

5 months ago