Malware

W32/Alman-C (file analysis)

Malware Removal

The W32/Alman-C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/Alman-C virus can do?

  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine W32/Alman-C?


File Info:

name: 1C2BF32622F779983962.mlw
path: /opt/CAPEv2/storage/binaries/082834d9b3b2579c73876048a413f8659c7d0c1c3782f8e6684996e5e8d48557
crc32: 655F542D
md5: 1c2bf32622f7799839620c8fe0aa46d1
sha1: 109791a6f1d9170c975840a462429ae876b47b4a
sha256: 082834d9b3b2579c73876048a413f8659c7d0c1c3782f8e6684996e5e8d48557
sha512: 997e8fe7223532dbb6ec6ebc82d741e52e607d943886ad2df98e8b18ac3eafaaaa37c65a4b50c1c1029ba0d0ddacd4564d3f683b8fd37e57d9c17b342e22409c
ssdeep: 12288:RTSDvkkH8fsTpOZ3UWIxiPHgu3jeZR5OyB0SsP5:ZSDskflEZP4uiRQSo5
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T112D4B71262E54228F0F33A70697823344B7B7CA1AA3DC68F4198559D5EF3E80ED717A7
sha3_384: 2cc69eaabef6795dd741937de025177bfb31c9a86baeb10d94d09af7e43f0c799abdcfb6751d0a0eedeadd19263d00f8
ep_bytes: 90575f8bc08bd29083f200909083cb00
timestamp: 2007-02-17 05:53:57

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Auto File System Conversion Utility
FileVersion: 5.2.3790.3959 (srv03_sp2_rtm.070216-1710)
InternalName: autoconv
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: AUTOCONV.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 5.2.3790.3959
Translation: 0x0409 0x04b0

W32/Alman-C also known as:

BkavW32.AcLuC.PE
LionicVirus.Win32.Alman.lJEl
Elasticmalicious (high confidence)
MicroWorld-eScanWin32.Almanahe.D
FireEyeGeneric.mg.1c2bf32622f77998
CAT-QuickHealW32.Almanahe.B
SkyhighBehavesLike.Win32.Almanahe.jm
McAfeeW32/Almanahe.f.c
Cylanceunsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusVirus ( 00001b6e1 )
AlibabaVirus:Win32/Alman.701a544f
K7GWVirus ( 00001b6e1 )
Cybereasonmalicious.622f77
BaiduWin32.Virus.Alman.a
SymantecW32.Almanahe.B!inf
ESET-NOD32Win32/Alman.NAB
APEXMalicious
TrendMicro-HouseCallPE_CORELINK.C-1
ClamAVWin.Trojan.Alman-5
KasperskyVirus.Win32.Alman.b
BitDefenderWin32.Almanahe.D
NANO-AntivirusVirus.Win32.Alman.xyevp
AvastFileRepMalware [Inf]
TencentVirus.Win32.Magister.a
TACHYONVirus/W32.Alman.B
EmsisoftWin32.Almanahe.D (B)
GoogleDetected
F-SecureMalware.W32/Alman.BB
DrWebWin32.Alman.1
ZillyaVirus.Alman.Win32.2
TrendMicroPE_CORELINK.C-1
Trapminemalicious.moderate.ml.score
SophosW32/Alman-C
IkarusVirus.Alman
GDataWin32.Almanahe.D
JiangminWin32/Almana.c
VaristW32/Alman.C
AviraW32/Alman.BB
Antiy-AVLVirus/Win32.Alman.b
KingsoftWorm.DLan.b.79872
XcitiumVirus.Win32.Alman.A@18f6pd
ArcabitWin32.Almanahe.D
ViRobotWin32.Alman.B
ZoneAlarmVirus.Win32.Alman.b
MicrosoftVirus:Win32/Almanahe.B
CynetMalicious (score: 99)
AhnLab-V3Win32/Alman.C
BitDefenderThetaAI:FileInfector.3231077510
ALYacWin32.Almanahe.D
MAXmalware (ai score=80)
VBA32Virus.Win32.Alman.B
PandaW32/Almanahe.C
RisingWorm.Win32.Magistr.i (CLASSIC)
YandexWin32.Alman.B
SentinelOneStatic AI – Suspicious PE
MaxSecureVirus.Alman.B
FortinetW32/Alman.B
AVGFileRepMalware [Inf]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)
alibabacloudVirus:Win/Alman.NAB(dyn)

How to remove W32/Alman-C?

W32/Alman-C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment