Trojan

How to remove “Trojan.Generic.35785663”?

Malware Removal

The Trojan.Generic.35785663 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Generic.35785663 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • CAPE detected the embedded win api malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan.Generic.35785663?


File Info:

name: 74B0A85E53A96ED9CFFD.mlw
path: /opt/CAPEv2/storage/binaries/73f492bf1faae12e5a253b49aa59d73639cb8957330e2efbe71cc580cc2ee898
crc32: 01A3BDEF
md5: 74b0a85e53a96ed9cffdc60fbf2be45e
sha1: a701f15bd75941010b06e8ed96a0976156e480f6
sha256: 73f492bf1faae12e5a253b49aa59d73639cb8957330e2efbe71cc580cc2ee898
sha512: 21582153beaf226c054445169c3d8c9f11425ad9603332677840b0153043db1a0681082b52a3cbaff3f8aa5d73a9828f2a6a37a6f89987ee7d170d8ca599dc4e
ssdeep: 98304:RhuAa5tGMD82ZybV5MnLuMkKLKz8McsyUMScPVuNC0QZAAgOwBwlZvAohFTD0WqR:y58hbVuLg8MBbMXU1oAOwCZ4G8NRLO2
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15D5633B7F800A43BE06097301E6A747D49792B2715350479FBED2E4B6B3734AC29AB17
sha3_384: d5aa7d720b48a4327311f9b65f3bc620c54fcedee15d6da6bd00f385b86b00a9b40172eaf39d2aa9791f8da2fb4ecb41
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2024-04-29 18:37:12

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Zoom Player Plugin Setup
FileVersion:
LegalCopyright:
ProductName: Zoom Player Plugin
ProductVersion:
Translation: 0x0000 0x04b0

Trojan.Generic.35785663 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
MicroWorld-eScanTrojan.Generic.35785663
FireEyeTrojan.Generic.35785663
SkyhighBehavesLike.Win32.BadFile.vc
McAfeeArtemis!74B0A85E53A9
Cylanceunsafe
VIPRETrojan.Generic.35785663
SangforTrojan.Win32.Agent.V5g6
K7GWTrojan ( 005722f11 )
K7AntiVirusTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R002H0CDU24
Paloaltogeneric.ml
KasperskyUDS:Trojan.Win32.Ekstak.gen
BitDefenderTrojan.Generic.35785663
AvastOther:Malware-gen [Trj]
EmsisoftTrojan.Generic.35785663 (B)
GoogleDetected
F-SecureHeuristic.HEUR/AGEN.1373347
Trapminesuspicious.low.ml.score
SophosMal/Generic-S
SentinelOneStatic AI – Suspicious PE
GDataWin32.Backdoor.Bodelph.9EO1EU
VaristW32/Trojan.MHHD-0873
AviraHEUR/AGEN.1373347
ArcabitTrojan.Generic.D2220BBF
ViRobotTrojan.Win.Z.Agent.6437254
ZoneAlarmUDS:Trojan.Win32.Ekstak.gen
MicrosoftTrojan:Win32/Wacatac.A!ml
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win.Malware-gen.R646825
ALYacTrojan.Generic.35785663
MAXmalware (ai score=83)
MalwarebytesAdware.DownloadAssistant
MaxSecureTrojan.Malware.73555928.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
alibabacloudTrojan[dropper]:Win/Ekstak.gyf

How to remove Trojan.Generic.35785663?

Trojan.Generic.35785663 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment