Trojan

Trojan:Win32/XetimaLogger.MR removal

Malware Removal

The Trojan:Win32/XetimaLogger.MR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/XetimaLogger.MR virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Installs itself for autorun at Windows startup
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan:Win32/XetimaLogger.MR?


File Info:

crc32: 70AEAE5F
md5: 0019111f7841f5b1c278e2044d2f9d5e
name: 0019111F7841F5B1C278E2044D2F9D5E.mlw
sha1: a278ca51692e7ba06296609e7d8658ad999d975f
sha256: 96ab46097968162491d192347bb607c5ff43d8b8ac3a813ee54dc3cdf84828d1
sha512: 537acf17e0c530bdc01c12abe292c1641b8c1a146f7e4ecf06077752c64fcf1d8b6427aeb20105254d065832881571d78954116c7c572ec52e664e8c2b250410
ssdeep: 12288:TCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZ:TN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pc
type: PE32 executable (console) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan:Win32/XetimaLogger.MR also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.806159
FireEyeGeneric.mg.0019111f7841f5b1
McAfeeGenericRXMY-XX!0019111F7841
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Razy.4!c
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderGen:Variant.Razy.806159
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_60% (D)
CyrenW32/Kryptik.CRS2.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:PWSX-gen [Trj]
ClamAVWin.Packed.Razy-9811609-0
KasperskyTrojan-PSW.Win32.Stelega.ada
AlibabaTrojanPSW:Win32/Stelega.f098550d
NANO-AntivirusTrojan.Win32.Agensla.idsmbe
ViRobotTrojan.Win32.Z.Razy.543312
RisingTrojan.Ymacco!8.11BE1 (TFE:2:WiUaDYH6Q4F)
Ad-AwareGen:Variant.Razy.806159
SophosMal/Generic-S
ComodoMalware@#1p8vdpb8ux4f2
F-SecureTrojan.TR/AD.XetimaLogger.dkaaw
DrWebBackDoor.SpyBotNET.25
ZillyaTrojan.Kryptik.Win32.2748025
TrendMicroTROJ_GEN.R06EC0DLJ20
McAfee-GW-EditionBehavesLike.Win32.Generic.hc
EmsisoftGen:Variant.Razy.806159 (B)
IkarusTrojan.MSIL.Agent
JiangminTrojanSpy.Noon.qnm
AviraTR/AD.XetimaLogger.dkaaw
MAXmalware (ai score=81)
KingsoftWin32.PSWTroj.Stelega.a.(kcloud)
MicrosoftTrojan:Win32/XetimaLogger.MR
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Razy.DC4D0F
ZoneAlarmTrojan-PSW.Win32.Stelega.ada
GDataGen:Variant.Razy.806159
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R358915
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34700.HuX@aKbBPWii
ALYacGen:Variant.Razy.806159
VBA32BScope.Trojan.Winlock
MalwarebytesTrojan.MalPack
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.HIEO
TrendMicro-HouseCallTROJ_GEN.R06EC0DLJ20
TencentWin32.Trojan.Dropper.Kf
YandexTrojan.Kryptik!Q4fwTxv0+fo
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Kryptik.HIEO!tr
AVGWin32:PWSX-gen [Trj]
Cybereasonmalicious.1692e7
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Spy.02a

How to remove Trojan:Win32/XetimaLogger.MR?

Trojan:Win32/XetimaLogger.MR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment