Trojan

Trojan.MSIL.Injector.MF (B) removal guide

Malware Removal

The Trojan.MSIL.Injector.MF (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.MSIL.Injector.MF (B) virus can do?

  • The binary likely contains encrypted or compressed data.
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz

How to determine Trojan.MSIL.Injector.MF (B)?


File Info:

crc32: B2497D71
md5: 61ff7de4d9ff1c5e17c5b29b0fec86b9
name: joined.exe
sha1: 3e7fa66623f6f1f75c4cf2cf6e81d570af1b59d0
sha256: 9455aaeddb6ad7cab447cea331f37fce5812a923c84958cab24ac9bafbe0c7dd
sha512: de2c95bed0525fa1a6914532a03c96a6b98cd7537aff5982d03a724a2e17c4699e04179a327098bbca6963156b32a603db3e0ab6fcefab1f2d810d16be3ab9e9
ssdeep: 12288:j9wNaSxzqOcstYhhhmzsoLPQIqtQtVWbhdpaC:MzBUhLoLPQRSMddpaC
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright 2019 Google LLC. All rights reserved.
InternalName: chrome_exe
CompanyShortName: Google
FileVersion: 75.0.3770.80
CompanyName: Google LLC
ProductShortName: Chrome
ProductName: Google Chrome
LastChange: 9a9aa15057b6b2cc0909bdcf638c0b65ecd516f2-refs/branch-heads/3770@#948
ProductVersion: 75.0.3770.80
FileDescription: Google Chrome
OriginalFilename: chrome.exe
Official Build: 1
Translation: 0x0409 0x04b0

Trojan.MSIL.Injector.MF (B) also known as:

MicroWorld-eScanTrojan.MSIL.Injector.MF
FireEyeGeneric.mg.61ff7de4d9ff1c5e
CAT-QuickHealVirtool.Vbinder.A4
Qihoo-360HEUR/QVM20.1.B5D7.Malware.Gen
McAfeeGenericRXAC-LG!61FF7DE4D9FF
CylanceUnsafe
AegisLabTrojan.Win32.Poison.tnhw
BitDefenderTrojan.MSIL.Injector.MF
K7GWBackdoor ( 0040f6fb1 )
K7AntiVirusBackdoor ( 0040f6fb1 )
Invinceaheuristic
BaiduWin32.Trojan-Dropper.Small.o
NANO-AntivirusTrojan.Win32.Poison.cbeljp
F-ProtW32/GenTroj.S.gen!Eldorado
SymantecTrojan.Dropper!g1
APEXMalicious
ClamAVWin.Trojan.Poison-8692
KasperskyBackdoor.Win32.Poison.ggrf
ViRobotBackdoor.Win32.Agent.67584.L
Ad-AwareTrojan.MSIL.Injector.MF
SophosTroj/Vbinder-D
ComodoTrojWare.Win32.Ransom.Xorist.ET@4mg4hg
F-SecureHeuristic.HEUR/AGEN.1022100
DrWebTrojan.MulDrop8.22787
TrendMicroTROJ_VBINDER.SM
McAfee-GW-EditionBehavesLike.Win32.Generic.gc
FortinetW32/Xorist.ET!tr
Trapminemalicious.high.ml.score
CMCBackdoor.Win32.Poison!O
EmsisoftTrojan.MSIL.Injector.MF (B)
SentinelOneDFI – Malicious PE
CyrenW32/GenTroj.S.gen!Eldorado
JiangminBackdoor/Poison.abtg
AviraHEUR/AGEN.1022100
MAXmalware (ai score=82)
Endgamemalicious (high confidence)
ArcabitTrojan.MSIL.Injector.MF
ZoneAlarmBackdoor.Win32.Poison.ggrf
MicrosoftVirTool:Win32/Vbinder
AhnLab-V3Backdoor/Win32.Poison.R72119
Acronissuspicious
ALYacTrojan.MSIL.Injector.MF
VBA32Backdoor.Poison
MalwarebytesBackdoor.Dropper
PandaTrj/Injector.BH
ESET-NOD32Win32/TrojanDropper.Small.NMM
TrendMicro-HouseCallTROJ_VBINDER.SM
RisingBackdoor.Poison!8.2D7/N3#100% (RDM+:cmRtazqilhwtT/VytW0ylR73aNbG)
YandexTrojan.Oxij.Gen.LA
IkarusBackdoor.Poison
eGambitUnsafe.AI_Score_99%
GDataTrojan.MSIL.Injector.MF
AVGWin32:GenMalicious-NUS [Trj]
Cybereasonmalicious.4d9ff1
AvastWin32:GenMalicious-NUS [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.MSIL.Injector.MF (B)?

Trojan.MSIL.Injector.MF (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment