Malware

Win32:Dorder-X [Trj] removal instruction

Malware Removal

The Win32:Dorder-X [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Dorder-X [Trj] virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Unconventionial language used in binary resources: Chinese (Macau)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by registry key

Related domains:

eaii.protodoilafc.net
eaff.protodoilafc.net

How to determine Win32:Dorder-X [Trj]?


File Info:

crc32: C1F7F400
md5: 327f73732740a7991d3e39c880332849
name: 327F73732740A7991D3E39C880332849.mlw
sha1: d88e86cfbcbeee34ac14e7fab0153f7e7d8edb63
sha256: 7b1d34181da40d15cac4615d4a1b349489fdc345c3900c8c274884eefa6fc124
sha512: c8ae0abe008aa679e4feaacd9f1a86b3ae98b2559d62a046c1eac17d2efbb7e895ab8a65e0a12d6850ff6466ed40b58de669fe3c87c99e3aa4960a2525bb6f28
ssdeep: 1536:5I0xIe5HViK6DiE/U1ZVz8u+cXKXyuFvdH4GKBnD9oOKh/FCkIzF/OxglsDueTY:5Mmy7/QZcgwTYRC49y5JMZqs+E2vZ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2013
InternalName: Ply
FileVersion: 175, 107, 174, 250
CompanyName: ATMEL
ProductVersion: 42, 85, 59, 141
FileDescription: Mysteries

Win32:Dorder-X [Trj] also known as:

K7AntiVirusProxy-Program ( 0055e3ff1 )
LionicTrojan.Multi.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader19.32514
CynetMalicious (score: 100)
CAT-QuickHealRansom.Tescrypt.MUE.ZZ4
ALYacTrojan.TeslaCrypt.Gen.4
CylanceUnsafe
ZillyaTrojan.Blocker.Win32.33485
CrowdStrikewin/malicious_confidence_90% (D)
AlibabaTrojanDropper:Win32/Bunitu.88979733
K7GWProxy-Program ( 0055e3ff1 )
Cybereasonmalicious.32740a
CyrenW32/S-c95c97d6!Eldorado
SymantecTrojan.Gen
ESET-NOD32Win32/TrojanProxy.Agent.NZP
APEXMalicious
AvastWin32:Dorder-X [Trj]
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.TeslaCrypt.Gen.4
NANO-AntivirusTrojan.Win32.Blocker.eanhqq
MicroWorld-eScanTrojan.TeslaCrypt.Gen.4
TencentWin32.Trojan.Blocker.Lihb
Ad-AwareTrojan.TeslaCrypt.Gen.4
SophosML/PE-A + Mal/Bunitu-B
BitDefenderThetaGen:NN.ZexaF.34142.gq0@aCRfcIkb
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPLOCKY.SM1
McAfee-GW-EditionBehavesLike.Win32.BadFile.ch
FireEyeGeneric.mg.327f73732740a799
EmsisoftTrojan.TeslaCrypt.Gen.4 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Blocker.bot
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1113544
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojanDropper:Win32/Bunitu.G
ArcabitTrojan.TeslaCrypt.Gen.4
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.TeslaCrypt.Gen.4
AhnLab-V3Win-Trojan/Lockycrypt.Gen
Acronissuspicious
McAfeeArtemis!327F73732740
MAXmalware (ai score=82)
VBA32BScope.TrojanDownloader.Talalpek
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_HPLOCKY.SM1
RisingTrojan.Generic@ML.96 (RDML:93x6ft8dEz+d4YcFn7EYiQ)
IkarusTrojan-Proxy.Agent
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Bourben.MVC!tr
AVGWin32:Dorder-X [Trj]
Paloaltogeneric.ml

How to remove Win32:Dorder-X [Trj]?

Win32:Dorder-X [Trj] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment