Categories: Malware

Win32:Dorder-X [Trj] removal instruction

The Win32:Dorder-X [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Dorder-X [Trj] virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Unconventionial language used in binary resources: Chinese (Macau)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by registry key

Related domains:

eaii.protodoilafc.net
eaff.protodoilafc.net

How to determine Win32:Dorder-X [Trj]?


File Info:

crc32: C1F7F400md5: 327f73732740a7991d3e39c880332849name: 327F73732740A7991D3E39C880332849.mlwsha1: d88e86cfbcbeee34ac14e7fab0153f7e7d8edb63sha256: 7b1d34181da40d15cac4615d4a1b349489fdc345c3900c8c274884eefa6fc124sha512: c8ae0abe008aa679e4feaacd9f1a86b3ae98b2559d62a046c1eac17d2efbb7e895ab8a65e0a12d6850ff6466ed40b58de669fe3c87c99e3aa4960a2525bb6f28ssdeep: 1536:5I0xIe5HViK6DiE/U1ZVz8u+cXKXyuFvdH4GKBnD9oOKh/FCkIzF/OxglsDueTY:5Mmy7/QZcgwTYRC49y5JMZqs+E2vZtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2013InternalName: PlyFileVersion: 175, 107, 174, 250CompanyName: ATMELProductVersion: 42, 85, 59, 141FileDescription: Mysteries

Win32:Dorder-X [Trj] also known as:

K7AntiVirus Proxy-Program ( 0055e3ff1 )
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
DrWeb Trojan.DownLoader19.32514
Cynet Malicious (score: 100)
CAT-QuickHeal Ransom.Tescrypt.MUE.ZZ4
ALYac Trojan.TeslaCrypt.Gen.4
Cylance Unsafe
Zillya Trojan.Blocker.Win32.33485
CrowdStrike win/malicious_confidence_90% (D)
Alibaba TrojanDropper:Win32/Bunitu.88979733
K7GW Proxy-Program ( 0055e3ff1 )
Cybereason malicious.32740a
Cyren W32/S-c95c97d6!Eldorado
Symantec Trojan.Gen
ESET-NOD32 Win32/TrojanProxy.Agent.NZP
APEX Malicious
Avast Win32:Dorder-X [Trj]
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.TeslaCrypt.Gen.4
NANO-Antivirus Trojan.Win32.Blocker.eanhqq
MicroWorld-eScan Trojan.TeslaCrypt.Gen.4
Tencent Win32.Trojan.Blocker.Lihb
Ad-Aware Trojan.TeslaCrypt.Gen.4
Sophos ML/PE-A + Mal/Bunitu-B
BitDefenderTheta Gen:NN.ZexaF.34142.gq0@aCRfcIkb
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom_HPLOCKY.SM1
McAfee-GW-Edition BehavesLike.Win32.BadFile.ch
FireEye Generic.mg.327f73732740a799
Emsisoft Trojan.TeslaCrypt.Gen.4 (B)
SentinelOne Static AI – Malicious PE
Jiangmin Trojan.Blocker.bot
Webroot W32.Trojan.Gen
Avira HEUR/AGEN.1113544
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft TrojanDropper:Win32/Bunitu.G
Arcabit Trojan.TeslaCrypt.Gen.4
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Trojan.TeslaCrypt.Gen.4
AhnLab-V3 Win-Trojan/Lockycrypt.Gen
Acronis suspicious
McAfee Artemis!327F73732740
MAX malware (ai score=82)
VBA32 BScope.TrojanDownloader.Talalpek
Panda Trj/GdSda.A
TrendMicro-HouseCall Ransom_HPLOCKY.SM1
Rising Trojan.Generic@ML.96 (RDML:93x6ft8dEz+d4YcFn7EYiQ)
Ikarus Trojan-Proxy.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Bourben.MVC!tr
AVG Win32:Dorder-X [Trj]
Paloalto generic.ml

How to remove Win32:Dorder-X [Trj]?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

WebWatcher.Spyware.Monitor.DDS removal

The WebWatcher.Spyware.Monitor.DDS is considered dangerous by lots of security experts. When this infection is active,…

51 mins ago

What is “Lazy.519114”?

The Lazy.519114 is considered dangerous by lots of security experts. When this infection is active,…

55 mins ago

Should I remove “Malware.AI.3622831725”?

The Malware.AI.3622831725 is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

What is “Generic.Dacic.94CCEEA9.A.B2226F8C (B)”?

The Generic.Dacic.94CCEEA9.A.B2226F8C (B) is considered dangerous by lots of security experts. When this infection is…

1 hour ago

What is “Tedy.577368”?

The Tedy.577368 is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

MSIL/TrojanDownloader.Agent.QRC removal tips

The MSIL/TrojanDownloader.Agent.QRC is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago