Trojan

Trojan:Win32/Aenjaris!pz removal

Malware Removal

The Trojan:Win32/Aenjaris!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Aenjaris!pz virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan:Win32/Aenjaris!pz?


File Info:

name: 088D022317E3F9EBF7A7.mlw
path: /opt/CAPEv2/storage/binaries/5a3d5d00bd09d7b0756a50a5149285bf1f912e8cfa933d9de8563834ead08196
crc32: F911E43B
md5: 088d022317e3f9ebf7a778f57af31bd0
sha1: 740b994823e28d0dba40ff6ba0282b609d487620
sha256: 5a3d5d00bd09d7b0756a50a5149285bf1f912e8cfa933d9de8563834ead08196
sha512: dcb37dd1aab9f2209ec8b650821bc6bae390b3536713ec6b03facc511d0d0d33065923f08e4561c66549b097fc680019893ada73cc2468626afe55a74980dc80
ssdeep: 3072:/LQaL9tbLkRIgd1Lye9yjE2hWAN5XbxlUKL+LOfKpLthEX9wT6sa:TlZtbLWIgd1LZ9oECZbxlUS+LOyEXAa
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A8346C1236C2C073E4B702718CE6C7787BB6BDA19B36928B7BC03B4D6E715968A35351
sha3_384: bcf8138d1f15a8cf14bda47e4cc714fcc4c0cf04ddeac01bc9d687b4e80342985d16f4070f15f109005a7fbaa7ea22f5
ep_bytes: 60b9000000008ab100104000c0cee688
timestamp: 2007-06-02 06:27:43

Version Info:

0: [No Data]

Trojan:Win32/Aenjaris!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Agent.Y!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Application.Graftor.563835
FireEyeGeneric.mg.088d022317e3f9eb
SkyhighBehavesLike.Win32.Generic.dm
ALYacGen:Variant.Application.Graftor.563835
Cylanceunsafe
ZillyaTrojan.Agent.Win32.3789392
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Aenjaris.9b9a77d9
K7GWTrojan ( 005ac2dd1 )
K7AntiVirusTrojan ( 005ac2dd1 )
ArcabitTrojan.Application.Graftor.D89A7B
BitDefenderThetaGen:NN.ZexaF.36680.ouY@aqyzW2k
VirITTrojan.Win32.MulDrop5.CKMW
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.GFNP
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Zusy-9759517-0
KasperskyTrojan.Win32.Agent.antno
BitDefenderGen:Variant.Application.Graftor.563835
NANO-AntivirusTrojan.Win32.Drop.icensh
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.Agent.zl
TACHYONTrojan/W32.Agent.233472.AUM
EmsisoftGen:Variant.Application.Graftor.563835 (B)
F-SecureTrojan.TR/Kryptik.hjxtv
DrWebTrojan.MulDrop5.42246
VIPREGen:Variant.Application.Graftor.563835
TrendMicroTROJ_GEN.R03BC0DLN23
SophosMal/EncPk-APJ
IkarusTrojan.Win32.Agent
JiangminTrojan.Agent.eoej
VaristW32/Agent.FRS.gen!Eldorado
AviraTR/Kryptik.hjxtv
Antiy-AVLTrojan/Win32.Agent.wtk
Kingsoftmalware.kb.a.782
XcitiumTrojWare.Win32.Agent.A@5j9hfe
MicrosoftTrojan:Win32/Aenjaris!pz
ZoneAlarmTrojan.Win32.Agent.antno
GDataWin32.Trojan.BadJoke.J
GoogleDetected
AhnLab-V3Trojan/Win.YU.R564145
Acronissuspicious
McAfeeGenericRXNE-YU!088D022317E3
MAXmalware (ai score=71)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/CI.A
ZonerTrojan.Win32.31738
TrendMicro-HouseCallTROJ_GEN.R03BC0DLN23
RisingTrojan.Agent!1.A728 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Agent.WTK!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Aenjaris!pz?

Trojan:Win32/Aenjaris!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment