Malware

How to remove “Win32/Hematite.E”?

Malware Removal

The Win32/Hematite.E is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Hematite.E virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Win32/Hematite.E?


File Info:

name: 20920280B4EBECA189C2.mlw
path: /opt/CAPEv2/storage/binaries/199a9150156260fa523bfeb596b50ba20684f4849bb76d6d8cb0f10b60d338b4
crc32: 76B88A63
md5: 20920280b4ebeca189c2fe5cd504b563
sha1: 264aa3cf265ff6039352e77014475bbb2c65e29f
sha256: 199a9150156260fa523bfeb596b50ba20684f4849bb76d6d8cb0f10b60d338b4
sha512: 9572db2b34efe483a135663767097041afaf68792e56ee767854cde8cc2a324bfe2298644f8baae7f580906a92b8982568cd89d4a4d1057d8e984d11b2381fd1
ssdeep: 192:njR16QGzrWFnl0w5C5lztxQ1g5yiUzEHZRG73iijwM4N/RFBqocRo/Od3f7iv7WQ:VGzrwnlcvHFSEneHopbA9f7+7WnaOWN
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C0723912B7909239E8E50CF1217D26B7542E6D70235A93CFEB051589BC78F92F930767
sha3_384: 3cb1890a034ff0d04ee62096e7c811fd2fb63879848602494bfe713919554eeb2414d26cd075594851eb63ced9764c3f
ep_bytes: 81ec0011000087dbbe0004000150588b
timestamp: 2008-04-13 18:36:17

Version Info:

CompanyName: Microsoft Corporation
FileDescription: LFN strip/restore utility
FileVersion: 5.1.2600.5512 (xpsp.080413-2111)
InternalName: AUTOLFN.EXE
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: AUTOLFN.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 5.1.2600.5512
Translation: 0x0409 0x04b0

Win32/Hematite.E also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Hematite.4!c
AVGWin32:Evo-gen [Trj]
Elasticmalicious (high confidence)
DrWebWin32.Siggen.29
MicroWorld-eScanTrojan.GenericKDZ.102325
CAT-QuickHealW32.Infector.A5
SkyhighBehavesLike.Win32.HWorld.lm
McAfeeW32/HWorld!20920280B4EB
ZillyaTrojan.Ekstak.Win32.77177
SangforTrojan.Win32.Save.a
K7AntiVirusVirus ( 00508e1d1 )
AlibabaVirus:Win32/Hematite.4ccfb761
K7GWVirus ( 00508e1d1 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecTrojan.Gen.6
ESET-NOD32a variant of Win32/Hematite.E
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Virus.Hematite-6232506-0
KasperskyHEUR:Trojan.Win32.Ekstak.gen
BitDefenderTrojan.GenericKDZ.102325
NANO-AntivirusVirus.Win32.Infector.emtrum
AvastWin32:Evo-gen [Trj]
TencentVirus.Win32.Infector.ya
EmsisoftTrojan.GenericKDZ.102325 (B)
VIPRETrojan.GenericKDZ.102325
TrendMicroTROJ_GEN.R002C0DBC24
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.20920280b4ebeca1
SophosW32/HWorld-A
SentinelOneStatic AI – Suspicious PE
GoogleDetected
MAXmalware (ai score=85)
Antiy-AVLVirus/Win32.Infector.gen
KingsoftWin32.Troj.SysJunkT.hh
MicrosoftVirus:Win32/Hematite.A
XcitiumVirus.Win32.Hematite.A@77ycil
ArcabitTrojan.Generic.D18FB5
ZoneAlarmHEUR:Trojan.Win32.Ekstak.gen
GDataTrojan.GenericKDZ.102325
VaristW32/Trojan.DXT.gen!Eldorado
AhnLab-V3Virus/Win.Hworld.R556194
Acronissuspicious
ALYacTrojan.GenericKDZ.102325
TACHYONVirus/W32.Hematite
VBA32Virus.Hematite
Cylanceunsafe
TrendMicro-HouseCallTROJ_GEN.R002C0DBC24
RisingVirus.Hematite!1.EF53 (CLASSIC)
IkarusTrojan.Agent
MaxSecureVirus.W32.Infector.Gen
FortinetW32/Agent.D17
Cybereasonmalicious.f265ff
DeepInstinctMALICIOUS

How to remove Win32/Hematite.E?

Win32/Hematite.E removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment