Malware

Win32/AutoRun.Qhost.I removal instruction

Malware Removal

The Win32/AutoRun.Qhost.I is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/AutoRun.Qhost.I virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Installs a browser addon or extension
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid

How to determine Win32/AutoRun.Qhost.I?


File Info:

name: D892DE5F46625E33314F.mlw
path: /opt/CAPEv2/storage/binaries/c4eb5d934d1f1e9d9f5e376b858cb2064c12b164e975a2ac1f54b7328f441b89
crc32: B62025A6
md5: d892de5f46625e33314f7b596af2ba8e
sha1: 5212635e94fa73da877cc4bf13dfd6fd831710d9
sha256: c4eb5d934d1f1e9d9f5e376b858cb2064c12b164e975a2ac1f54b7328f441b89
sha512: 31cc5eb87dcaa658fee9846e7ebf2d97d598d33ba3b31e6fd4b56bc320d1c22049ba8f0e9aab4a707444c7cdc6114014f82ccdcfe7735a0c37ea0d63dc8de607
ssdeep: 384:5Gm3UqRKwBBnknIXq95sDyovphjVcNsJPt/sgERcdVZGJN8ycspPXqRKwBBrm3:57dbXqkGovy2/s4zGJN8lC7
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16813D7033FA8D584C63366741DEA46B817EBBD154A12E62F5152332FAC32A158DF6F83
sha3_384: 45372ffea3f8894dc04580b8a32f28805a65386601785c4dcb0799ad56dedc4ebfab967c9c2f802e2ecb10bb5a51dcc3
ep_bytes: 6884394000e8eeffffff000000000000
timestamp: 2006-09-04 10:25:11

Version Info:

Translation: 0x0804 0x04b0
CompanyName: 文件夹
ProductName: FRII
FileVersion: 999.999.0999
ProductVersion: 999.999.0999
InternalName: FR2
OriginalFilename: FR2.exe

Win32/AutoRun.Qhost.I also known as:

BkavW32.AIDetectMalware
LionicVirus.Win32.Folcom.n!c
Elasticmalicious (high confidence)
CMCGeneric.Win32.d892de5f46!MD
ALYacGen:Trojan.Malware.cm0@aqms@Veb
MalwarebytesGeneric.Malware/Suspicious
ZillyaVirus.Folcom.Win32.1
SangforTrojan.Win32.AutoRun.Amjj
K7AntiVirusRiskware ( 0040eff71 )
AlibabaTrojanDropper:Win32/dropper.ali1003001
K7GWRiskware ( 0040eff71 )
BitDefenderThetaAI:Packer.4B8613FC1D
VirITWorm.Win32.VB.CPV
SymantecW32.SillyDC
tehtrisGeneric.Malware
ESET-NOD32Win32/AutoRun.Qhost.I
APEXMalicious
ClamAVWin.Malware.Folcom-7290840-0
KasperskyVirus.Win32.Folcom.c
BitDefenderGen:Trojan.Malware.cm0@aqms@Veb
NANO-AntivirusVirus.Win32.Folcom.bbjlef
MicroWorld-eScanGen:Trojan.Malware.cm0@aqms@Veb
AvastWin32:AutoRun-JW
TencentWin32.Virus.Folcom.Yylw
EmsisoftGen:Trojan.Malware.cm0@aqms@Veb (B)
DrWebWin32.HLLW.Autoruner.5614
VIPREGen:Trojan.Malware.cm0@aqms@Veb
TrendMicroWORM_SILLY.GV
McAfee-GW-EditionNew Malware.iu
FireEyeGeneric.mg.d892de5f46625e33
SophosMal/Generic-R
SentinelOneStatic AI – Suspicious PE
WebrootW32.Malware.Gen
MicrosoftTrojan:Win32/Wacatac.B!ml
XcitiumVirus.Win32.Folcom.~A@7fvmx
ArcabitTrojan.Malware.E03D4A
ZoneAlarmVirus.Win32.Folcom.c
GDataGen:Trojan.Malware.cm0@aqms@Veb
GoogleDetected
AhnLab-V3Worm/Win.Tufik.R562400
McAfeeArtemis!D892DE5F4662
MAXmalware (ai score=100)
Cylanceunsafe
PandaGeneric Suspicious
TrendMicro-HouseCallWORM_SILLY.GV
RisingWorm.Mail.Win32.Brontok.ar (CLASSIC)
YandexTrojan.GenAsa!joR6ZtiSqvY
IkarusTrojan.Win32.VB
MaxSecureVirus.W32.Folcom.c
FortinetW32/AutoRun.QHOST.I!worm
AVGWin32:AutoRun-JW
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/AutoRun.Qhost.I?

Win32/AutoRun.Qhost.I removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment