Trojan

What is “Trojan.Generic.22757946”?

Malware Removal

The Trojan.Generic.22757946 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Generic.22757946 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects the presence of Wine emulator via function name
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed analysis tools by a known file location
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Detects Sandboxie using a known mutex
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Checks for a known DeepFreeze Frozen State Mutex
  • Collects information to fingerprint the system

Related domains:

petunixag.top
patroxunac.top

How to determine Trojan.Generic.22757946?


File Info:

crc32: 35CB5A9C
md5: 37db00f36d181b8cde44c5885e7f590c
name: 37DB00F36D181B8CDE44C5885E7F590C.mlw
sha1: 668f009ec4c3092f8661983c36c77d0504b237a7
sha256: 3334d361ea5b8bc89552c81619cb32ae452128f7a05dc5d1e6f3515a8b06df97
sha512: 27cebde2c0c334d093d319094486a8480ec837ffa03831c73cc298e07c7f2713e70bee804ff4c63329edd367b2e817b3768984645ae04eddba2a610e0ea31a5a
ssdeep: 6144:FnqcvftwzTd8dd+Mq4Dt1npOjxzrqosfIr/SG7AzvlgZJ+4W:9wzTidsGtOjhrJGI+lvwQ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Generic.22757946 also known as:

Elasticmalicious (high confidence)
CynetMalicious (score: 99)
ALYacTrojan.Generic.22757946
CrowdStrikewin/malicious_confidence_90% (D)
Cybereasonmalicious.36d181
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.BJHQ
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Spy.Win32.Zbot.yuef
BitDefenderTrojan.Generic.22757946
NANO-AntivirusTrojan.Win32.Zbot.ewehoy
MicroWorld-eScanTrojan.Generic.22757946
TencentWin32.Trojan-spy.Zbot.Lmlf
Ad-AwareTrojan.Generic.22757946
SophosML/PE-A
ComodoMalware@#6vllk7fp9fg2
BitDefenderThetaGen:NN.ZexaF.34126.yyW@aWy3pJdi
VIPRETrojan.Win32.Generic!BT
TrendMicroMal_HPGen-37b
McAfee-GW-EditionBehavesLike.Win32.Kudj.fh
FireEyeGeneric.mg.37db00f36d181b8c
EmsisoftTrojan.Generic.22757946 (B)
WebrootTrojan.Dropper.Gen
AviraHEUR/AGEN.1117022
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataTrojan.Generic.22757946
Acronissuspicious
McAfeeArtemis!37DB00F36D18
MAXmalware (ai score=86)
VBA32BScope.TrojanRansom.Blocker
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/CI.A
TrendMicro-HouseCallMal_HPGen-37b
RisingTrojan.Generic@ML.93 (RDML:jLOy74ZcDXQdw0L9GYQdgg)
YandexTrojanSpy.Zbot!MvE5T0v2Ovo
IkarusTrojan-Ransom.GandCrab
FortinetW32/Kryptik.GBIY!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Trojan.Generic.22757946?

Trojan.Generic.22757946 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment