Trojan

UDS:Trojan.Win64.Shelma removal tips

Malware Removal

The UDS:Trojan.Win64.Shelma is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Trojan.Win64.Shelma virus can do?

  • Anomalous binary characteristics

How to determine UDS:Trojan.Win64.Shelma?


File Info:

crc32: 0F8763D5
md5: 0dfc195bab3f860e372fe58f236b68bc
name: 0DFC195BAB3F860E372FE58F236B68BC.mlw
sha1: f9530f4f42cc3e296939c2b49951f2d58f876162
sha256: 4e978d08da96c05ecb518c947f152b498743178dbdfbb73087106bf918459741
sha512: 6c7fd8bad7f911bbf328751c21b252df545acdb7995fa63cf70ea77d56fa014929a956513f283cbcfda442321a4692565fc33c96f8b7910efb0b183012a5e4f2
ssdeep: 192:n5VM9CxBTuu5DO6aogtgto8e3Q5tfmXU/93GSZMJTrj:5VSCxZPFapGti3xuvA
type: PE32+ executable (GUI) x86-64, for MS Windows

Version Info:

0: [No Data]

UDS:Trojan.Win64.Shelma also known as:

Elasticmalicious (high confidence)
CrowdStrikewin/malicious_confidence_90% (W)
APEXMalicious
CynetMalicious (score: 100)
KasperskyUDS:Trojan.Win64.Shelma
FireEyeGeneric.mg.0dfc195bab3f860e
MicrosoftTrojan:Win32/Wacatac.B!ml
GridinsoftSuspicious.XOR_Encoded.bot!yf
ZoneAlarmUDS:DangerousObject.Multi.Generic
Qihoo-360Win64/Heur.Generic.H8oAmx8A

How to remove UDS:Trojan.Win64.Shelma?

UDS:Trojan.Win64.Shelma removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment