Trojan

Should I remove “Trojan.Win32.Zenpak.xry”?

Malware Removal

The Trojan.Win32.Zenpak.xry is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.xry virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Checks for the presence of known windows from debuggers and forensic tools
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan.Win32.Zenpak.xry?


File Info:

crc32: 37FB6A90
md5: a82d7f2034d9faf45147c80d9fa1f62c
name: ggggggg.exe
sha1: 61172ae6549298ba79aa985be7a27a830ce11730
sha256: e7e6adc0477aeb85462786a9cb2251a9017d789c93aacdda2fcd1c5ee64476f3
sha512: a63450eec891b814b03367f9590c4e3f7581518f61c8fbb9a2b6cfa7db54f6b42488b0704935ff894a5d8a16f49309a3b8f5f097c4141a5cfed5771f0b638995
ssdeep: 24576:dZsg4aroRHr0z2908+0UrlqphJZ3EsLjJUBTsu1A9C14U1J8XPYRgdIK45YiCztg:dHLr0r0za2hgDJZ/SBT91AU1D4YydDm
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 2010-2015, Intel Corporation. All rights reserved.
Assembly Version: 1750.12.0.1083
InternalName: JhiSharp.dll
FileVersion: 1750.12.0.1083
CompanyName: Intel Corporation
LegalTrademarks:
Comments: Intel(R) Dynamic Application Loader Host Interface DLL
ProductName: Intel(R) Dynamic Application Loader Host Interface
ProductVersion: 1750.12.0.1083
FileDescription: Intel(R) Dynamic Application Loader Host Interface
OriginalFilename: JhiSharp.dll

Trojan.Win32.Zenpak.xry also known as:

BkavHW32.Packed.
MicroWorld-eScanTrojan.GenericKD.33573638
McAfeeArtemis!A82D7F2034D9
CylanceUnsafe
BitDefenderTrojan.GenericKD.33573638
K7GWSpyware ( 00551e2e1 )
Cybereasonmalicious.654929
BitDefenderThetaGen:NN.ZexaF.34104.J12@aKrRo4ni
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Spy.Agent.PTL
AvastWin32:DangerousSig [Trj]
GDataTrojan.GenericKD.33573638
KasperskyTrojan.Win32.Zenpak.xry
RisingStealer.Kpot!1.BA3E (CLOUD)
Endgamemalicious (high confidence)
EmsisoftTrojan.GenericKD.33573638 (B)
F-SecureTrojan.TR/AD.Khalesi.hmjvc
DrWebTrojan.PWS.Steam.17948
Invinceaheuristic
McAfee-GW-EditionArtemis!Trojan
SentinelOneDFI – Suspicious PE
Trapminemalicious.high.ml.score
SophosMal/Generic-S
APEXMalicious
JiangminTrojan.Banker.ClipBanker.nd
AviraTR/AD.Khalesi.hmjvc
MicrosoftTrojan:Win32/Wacatac.C!ml
ArcabitTrojan.Generic.D2004B06
ZoneAlarmTrojan.Win32.Zenpak.xry
VBA32BScope.Trojan.Tiggre
ALYacTrojan.GenericKD.33573638
MAXmalware (ai score=82)
Ad-AwareTrojan.GenericKD.33573638
PandaGeneric Suspicious
TencentWin32.Trojan.Zenpak.Llhd
IkarusTrojan-Spy.Agent
FortinetW32/Agent.PTL!tr.spy
AVGWin32:DangerousSig [Trj]
Paloaltogeneric.ml

How to remove Trojan.Win32.Zenpak.xry?

Trojan.Win32.Zenpak.xry removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment