Categories: Trojan

How to remove “Trojan.Win32.Yakes.aaitr”?

The Trojan.Win32.Yakes.aaitr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Yakes.aaitr virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
www.ip-adress.com
redirector.gvt1.com
r4—sn-4g5ednsy.gvt1.com

How to determine Trojan.Win32.Yakes.aaitr?


File Info:

crc32: 24EEAE8Bmd5: 8e7db09e124756b09471ce5829a5f850name: upload_filesha1: c8b1793d41245ce2e5db1650fa90eb69828de904sha256: b49ce40a34420c5334416f1134ff947cea829014cc16f9cd42b21825b36b16a8sha512: 2b07cfb6e0f4d5cb6a93ebbce73f92dc84bdcc3773ffdff9efd4dee59729931a84f53546e87daa968049895edcd654332d957e58831f3a3ee586acebc5454227ssdeep: 12288:MmJnJHUrcxNxIxfxNxnxNxIWxNxsyRxNxRxNx0xNx6gtKO2JO9j:z5cJkMONtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Win32.Yakes.aaitr also known as:

Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Razy.734534
FireEye Generic.mg.8e7db09e124756b0
Qihoo-360 Generic/Trojan.be1
McAfee GenericRXLR-OX!8E7DB09E1247
VIPRE Trojan.Win32.Generic!BT
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Gen:Variant.Razy.734534
K7GW Riskware ( 0040eff71 )
Cybereason malicious.d41245
TrendMicro Backdoor.Win32.QAKBOT.SMF
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:DangerousSig [Trj]
Kaspersky Trojan.Win32.Yakes.aaitr
Alibaba Trojan:Win32/Yakes.f3e9dc07
Rising Trojan.GenKryptik!8.AA55 (CLOUD)
Ad-Aware Gen:Variant.Razy.734534
Comodo .UnclassifiedMalware@0
F-Secure Trojan.TR/Crypt.Agent.vqolv
DrWeb Trojan.Inject3.50484
Invincea heuristic
Fortinet W32/Cridex.VHO!tr
Sophos Mal/EncPk-APV
Ikarus Trojan.Win32.Krypt
Avira TR/Crypt.Agent.vqolv
MAX malware (ai score=82)
Antiy-AVL GrayWare/Win32.Kryptik.ehls
Arcabit Trojan.Razy.DB3546
ZoneAlarm Trojan.Win32.Yakes.aaitr
Microsoft Trojan:Win32/Qakbot.AR!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Agent.C4180523
ALYac Gen:Variant.Razy.734534
VBA32 BScope.Backdoor.Qbot
Malwarebytes Backdoor.Bot
Panda Trj/Agent.PM
ESET-NOD32 a variant of Win32/Kryptik.HFNH
TrendMicro-HouseCall Backdoor.Win32.QAKBOT.SMF
SentinelOne DFI – Suspicious PE
GData Win32.Trojan.PSE.576ZS6
AVG Win32:DangerousSig [Trj]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_60% (W)

How to remove Trojan.Win32.Yakes.aaitr?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

1 day ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

1 day ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

1 day ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

1 day ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

1 day ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

1 day ago