Malware

W32/Shodi-I removal instruction

Malware Removal

The W32/Shodi-I is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/Shodi-I virus can do?

  • Anomalous binary characteristics

How to determine W32/Shodi-I?


File Info:

crc32: 9BBBD98B
md5: a68685426e1a83f1bb3536917891aafe
name: A68685426E1A83F1BB3536917891AAFE.mlw
sha1: e65cc15280a6d838282a451f8862fc1e0387610a
sha256: 10c81821da6e111c204d3052e6f25ab1a3cdbf5e5e25c92e2785f38c295121c1
sha512: 2c31248da240ef0379066fbbe16c5fb6e9b065c7b87d36790267f0940be5eb4e5076fbfb3eb460472fd802f79f2f04638f3f5e08048b11ad27ffc178334df2e9
ssdeep: 24576:dwMfqQzQq2oBrjjkOqF3tm7s7OwMfqQzQd:dwazQq2YhoSSOwazQd
type: PE32+ executable (GUI) x86-64, for MS Windows

Version Info:

0: [No Data]

W32/Shodi-I also known as:

DrWebWin32.HLLP.Shohdi.61457
CynetMalicious (score: 100)
CylanceUnsafe
SangforTrojan.Win32.Wacatac.B
AlibabaTrojan:Win32/Shodi.1dca2955
CyrenW64/Shohdi.A.gen!Eldorado
AvastWin32:Shodi
ClamAVWin.Trojan.FuBu-1
SophosW32/Shodi-I
McAfee-GW-EditionRDN/Generic.dx
MicrosoftTrojan:Win32/Wacatac.B!ml
McAfeeRDN/Generic.dx
IkarusHLLP.Win32.Shodi
FortinetW64/Shohdi.6145!tr
AVGWin32:Shodi

How to remove W32/Shodi-I?

W32/Shodi-I removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment