Trojan

Trojan.Win32.Scar.kpvr removal instruction

Malware Removal

The Trojan.Win32.Scar.kpvr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Scar.kpvr virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Attempts to modify Internet Explorer’s start page
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • A process attempted to delay the analysis task by a long amount of time.
  • Collects and encrypts information about the computer likely to send to C2 server

How to determine Trojan.Win32.Scar.kpvr?


File Info:

name: 45C5B3A250FE4407C2FC.mlw
path: /opt/CAPEv2/storage/binaries/5e20d177fe15f583aa2fe787aea6cb0efd1df04da819d9b3fc8b5cb8d4b37580
crc32: DAA6AD1B
md5: 45c5b3a250fe4407c2fc514baab89b88
sha1: 2b187826d078c0f206e996867026fb6bc6b226cb
sha256: 5e20d177fe15f583aa2fe787aea6cb0efd1df04da819d9b3fc8b5cb8d4b37580
sha512: b6c6c0371928ce186d1602f62fab3f208a4c2d0072e7456c4023158cdb97b4b57634e939a4a935b6f7470658e7782220e4f1d24e379511881c9306920a538cd3
ssdeep: 196608:J3aA+a9lwafnBZlSmEMGLj21hY81m0u7btKYRvOF/C4+hbQFHTjNLetSR9nJLQNw:JTfpNEMGL61eDTfthvONC4+hbQKA9JLX
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13FD63384B2878FB9CC354B3372E69969F3577B6B0B20319B9770AF14C7660939838467
sha3_384: 1c8a6fa0a7aa252c6d4af3a35b76e48fe126fb3060afb88a63f187a65a49120107ff98165db4362b8fe49ccfbad0f160
ep_bytes: 81ec8001000053555633db57895c2418
timestamp: 2009-06-06 21:41:48

Version Info:

0: [No Data]

Trojan.Win32.Scar.kpvr also known as:

MicroWorld-eScanTrojan.GenericKD.34289291
FireEyeTrojan.GenericKD.34289291
McAfeeArtemis!45C5B3A250FE
CylanceUnsafe
VIPRETrojan.GenericKD.34289291
SangforRiskware.Win32.RegSecFilesDisabler.mt
K7AntiVirusTrojan ( 0056e5201 )
K7GWTrojan ( 0056e5201 )
CyrenW32/ABTrojan.MQLE-9015
ESET-NOD32multiple detections
TrendMicro-HouseCallPUA_FreeCause
Paloaltogeneric.ml
KasperskyTrojan.Win32.Scar.kpvr
BitDefenderTrojan.GenericKD.34289291
NANO-AntivirusTrojan.Win32.Generic.euwlag
RisingTrojan.Generic@AI.95 (RDML:Wa0zjYceTtx0+NaeT8FBIA)
Ad-AwareTrojan.GenericKD.34289291
EmsisoftTrojan.GenericKD.34289291 (B)
ComodoMalware@#ekroq8ig7j5k
DrWebTrojan.FakeAV.10974
ZillyaTrojan.Scar.Win32.106759
McAfee-GW-EditionGenericR-IIP!1294AF914BD3
SophosGeneric PUA CL (PUA)
GDataTrojan.GenericKD.34289291
JiangminTrojan/LowZones.fp
AviraTR/LowZones.DZ.12
Antiy-AVLTrojan/Win32.LowZones
KingsoftWin32.Troj.LowZones.SU.(kcloud)
ArcabitTrojan.Generic.D20B368B
MicrosoftTrojan:Win32/Lowzones.DZ
ALYacTrojan.GenericKD.34289291
MAXmalware (ai score=82)
VBA32Trojan.Occamy
MalwarebytesMalware.Heuristic.1001
AvastWin32:Dropper-gen [Drp]
TencentWin32.Trojan.Agent.Pegb
YandexTrojan.GenAsa!KxUxC4QYpIE
IkarusTrojan.Win32.LowZones
FortinetW32/Agent.SZW
AVGWin32:Dropper-gen [Drp]
Cybereasonmalicious.250fe4
PandaTrj/CI.A

How to remove Trojan.Win32.Scar.kpvr?

Trojan.Win32.Scar.kpvr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment