Trojan

Trojan:Win32/VBClone!pz removal

Malware Removal

The Trojan:Win32/VBClone!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/VBClone!pz virus can do?

  • Sample contains Overlay data
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan:Win32/VBClone!pz?


File Info:

name: FDA8B562E385EC80C5CE.mlw
path: /opt/CAPEv2/storage/binaries/afb69a7117b489bd1eb3e0eba56a1329a8514c45790df669caaf2a004ec8f20f
crc32: D75E305A
md5: fda8b562e385ec80c5ceadd4aa365806
sha1: b2022b977dbffd65f8e4d1e5e455be8f4fae254d
sha256: afb69a7117b489bd1eb3e0eba56a1329a8514c45790df669caaf2a004ec8f20f
sha512: c0033b0edbb0e2ea153b140fedaab6590c821af2be7e2db39a367f144be412805a45173bde3cc3e9de3a10587562d976a65413e6111244ea25b50fe4e2d999eb
ssdeep: 3072:km0xoGTnPPOuCOf5d5FWcJts1rhGeT6ZH9xT88CQ9lTvpFn:kmio8WuCqdLWcJyOVh9lTvpF
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F7148F629970BB16E915097817A06BFA001D3C2F47E9030DBCADDE5F7353DAA34AF942
sha3_384: b37e2c966c81fe835fcaefbf0095207781a26685af172f4f4964e7bb7076e9c96450321f1f771ffa7a6cd65c009408b9
ep_bytes: 68c0914200e8f0ffffff000000000000
timestamp: 2019-01-12 12:27:37

Version Info:

0: [No Data]

Trojan:Win32/VBClone!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.VB.tpHb
DrWebTrojan.MulDrop17.61497
MicroWorld-eScanTrojan.GenericKDZ.100458
FireEyeGeneric.mg.fda8b562e385ec80
CAT-QuickHealTrojan.Dropper.S26708226
SkyhighBehavesLike.Win32.Generic.cc
McAfeeGenericRXHA-ZI!FDA8B562E385
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.VB.Win32.489227
SangforSuspicious.Win32.Save.vb
K7AntiVirusTrojan ( 005690671 )
AlibabaTrojan:Win32/Muldrop.329
K7GWTrojan ( 005690671 )
Cybereasonmalicious.77dbff
ArcabitTrojan.Generic.D1886A
BitDefenderThetaAI:Packer.C34907221F
VirITTrojan.Win32.Banker1.BRRU
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/VBClone.E
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Generickdz-10004857-0
KasperskyTrojan.Win32.VB.dosb
BitDefenderTrojan.GenericKDZ.100458
NANO-AntivirusTrojan.Win32.VB.fmvqeg
SUPERAntiSpywareTrojan.Agent/Gen-Strictor
AvastWin32:VB-AJKU [Trj]
TencentTrojan.Win32.VB.kh
EmsisoftTrojan.GenericKDZ.100458 (B)
F-SecureHeuristic.HEUR/Patched.Ren
VIPRETrojan.GenericKDZ.100458
SophosMal/VB-AQT
IkarusTrojan.VBClone
JiangminTrojan.VB.aqyg
VaristW32/VB_Troj.J.gen!Eldorado
AviraHEUR/Patched.Ren
Antiy-AVLTrojan/Win32.Wacatac.b
Kingsoftmalware.kb.a.997
XcitiumTrojWare.Win32.VBClone.B@88ji29
MicrosoftTrojan:Win32/VBClone!pz
ZoneAlarmTrojan.Win32.VB.dosb
GDataWin32.Trojan.VBClone.B
GoogleDetected
AhnLab-V3Trojan/Win32.Agent.R252862
Acronissuspicious
VBA32SScope.Trojan.VB
ALYacTrojan.GenericKDZ.100458
MAXmalware (ai score=81)
Cylanceunsafe
RisingTrojan.VBClone!1.E032 (CLASSIC)
YandexTrojan.VB!Oh3J4YWchBk
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.GenericML.xnet
FortinetW32/VBClone.D!tr
AVGWin32:VB-AJKU [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/VBClone!pz?

Trojan:Win32/VBClone!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment