Categories: Trojan

Should I remove “Trojan.Emotet.YP (B)”?

The Trojan.Emotet.YP (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Emotet.YP (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Collects information about installed applications
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan.Emotet.YP (B)?


File Info:

crc32: 749E49A0md5: 7a92e562f6f162f2c267c9a1110aa312name: 7A92E562F6F162F2C267C9A1110AA312.mlwsha1: 393eadc8f8d14493b41ab8dd29dd319f6c0531d1sha256: 402b57650577428a20d2293174ba6b99b1d79c65ca8269a6e02ef4d0a0b5b49bsha512: f93fe16dfef8f6faafad4e131a036ae0ab8c559359fa0489c2d5c92251e20b1b3be80aaa8525d7833553dfcfce461b85d9ae490045cd0ff896749a888ae874d0ssdeep: 24576:F4nNKtIhYR/76mf0HU8JLni1LjNvocD/0jnhqLBs+Gxec:F4NK2Y/92Lni11voc7MIixBtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: ?.x01LegalCopyrightFileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)torAuthn.exe: j%x01ProductNameicrosoft Corporation. All rights reserved.: Hx10x01OriginalFilenameCompanyName: Microsoft CorporationFileDescription: Windows Enhanced Storage Password Authentication Program.7600.16385: Drosoftxae Windowsxae Operating System: Bx0fx01ProductVersionTranslation: 0x0409 0x04b0

Trojan.Emotet.YP (B) also known as:

Bkav W32.AIDetect.malware2
K7AntiVirus Trojan ( 005356831 )
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.858
Cynet Malicious (score: 100)
ALYac Trojan.Emotet.YP
Cylance Unsafe
Zillya Trojan.Generic.Win32.780188
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
K7GW Trojan ( 005356831 )
Cybereason malicious.2f6f16
Cyren W32/Agent.BAD.gen!Eldorado
Symantec Packed.Generic.459
ESET-NOD32 a variant of Win32/Kryptik.GLWT
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Ransomware.Shade-7598580-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.Emotet.YP
MicroWorld-eScan Trojan.Emotet.YP
Tencent Malware.Win32.Gencirc.10cd7db1
Ad-Aware Trojan.Emotet.YP
Sophos ML/PE-A + Mal/Cerber-AM
BitDefenderTheta Gen:NN.ZexaF.34266.9q1@ayhpw!ci
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom.Win32.SHADE.SMB.hp
McAfee-GW-Edition BehavesLike.Win32.Dropper.dc
FireEye Generic.mg.7a92e562f6f162f2
Emsisoft Trojan.Emotet.YP (B)
SentinelOne Static AI – Malicious PE
Jiangmin Trojan.Fsysna.jib
Avira TR/AD.Troldesh.fxmlg
eGambit Unsafe.AI_Score_98%
Antiy-AVL Trojan/Generic.ASMalwS.2B430E9
Microsoft Ransom:Win32/Shade.C
GData Trojan.Emotet.YP
TACHYON Trojan/W32.Agent.1005089
AhnLab-V3 Trojan/Win32.Agent.R266421
Acronis suspicious
McAfee Trickbot-FRDP!7A92E562F6F1
MAX malware (ai score=85)
VBA32 BScope.Trojan.Fsysna
Malwarebytes Malware.AI.3504648514
Panda Trj/Genetic.gen
TrendMicro-HouseCall Ransom.Win32.SHADE.SMB.hp
Yandex Trojan.GenAsa!GwqqbRs3vQ0
Ikarus Trojan-Ransom.Crypted007
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.GKHG!tr
AVG Win32:Malware-gen

How to remove Trojan.Emotet.YP (B)?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

5 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

5 months ago