Malware

Win32/Injector.JPS removal instruction

Malware Removal

The Win32/Injector.JPS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Injector.JPS virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Detects Sandboxie through the presence of a library
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Win32/Injector.JPS?


File Info:

crc32: A7618701
md5: cdea2db098a14eef34b5c11ee0f915db
name: CDEA2DB098A14EEF34B5C11EE0F915DB.mlw
sha1: 53dbe09f06bcc37c3b20d8b42ac3cebb3bcae38e
sha256: b942bfbe2c27875fc13cf4c48c28eca1ccf1098a9d6e087dcd038be1a05cef89
sha512: f85983e8582638306394f1334b1ae242082139bb2c84e97d54294a39443b24acf15cfaebcbdec5dd839846ce2b7ecbd3b1e473f24bf32bfb4331947208a16416
ssdeep: 3072:tW1tWrKTcSElsIFKe8DErRmKvi9685RBl53TFYBv96wLgweD10xo7ivETOiVizk:tKt5HR7kK9Ranbz+
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0409 0x04b0
LegalCopyright: Chao Grendel Colloq Boylston
InternalName: jyu
FileVersion: 4.02.0001
CompanyName: Wilkie Latin Atlantic Mekong Janeiro Haney
ProductName: Sprague Carlyle Reid Thalia
ProductVersion: 4.02.0001
FileDescription: Nordstrom Ehrlich Angie Hubbard Norma
OriginalFilename: jyu.exe

Win32/Injector.JPS also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0055e3991 )
LionicTrojan.Win32.Blocker.j!c
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
ALYacGen:Variant.Symmi.63549
CylanceUnsafe
ZillyaTrojan.Injector.Win32.414458
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_80% (D)
AlibabaRansom:Win32/Blocker.ef7148ba
K7GWTrojan ( 0055e3991 )
Cybereasonmalicious.098a14
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.JPS
APEXMalicious
AvastWin32:Cambot-O [Trj]
KasperskyTrojan-Ransom.Win32.Blocker.dvco
BitDefenderGen:Variant.Symmi.63549
NANO-AntivirusTrojan.Win32.Blocker.fffjpk
MicroWorld-eScanGen:Variant.Symmi.63549
TencentWin32.Trojan.Blocker.Tdpq
Ad-AwareGen:Variant.Symmi.63549
SophosML/PE-A + Mal/VBCheMan-C
BitDefenderThetaAI:Packer.20C0CE6D20
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionTrojan-FBIP!CDEA2DB098A1
FireEyeGeneric.mg.cdea2db098a14eef
EmsisoftGen:Variant.Symmi.63549 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Blocker.dox
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Generic.ASMalwS.190D30D
MicrosoftTrojan:Win32/Dynamer!ac
SUPERAntiSpywareTrojan.Agent/Gen-Sincon
GDataWin32.Trojan.VB.I@gen
AhnLab-V3Trojan/Win32.VBKrypt.R10028
McAfeeTrojan-FBIP!CDEA2DB098A1
MAXmalware (ai score=98)
VBA32BScope.Trojan.VBKrypt
PandaTrj/GdSda.A
YandexTrojan.Blocker!j8sC5KPLC9w
IkarusWorm.Win32.Ainslot
FortinetW32/Cycler.ALGQ!tr
AVGWin32:Cambot-O [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Blocker.HwMAEpsA

How to remove Win32/Injector.JPS?

Win32/Injector.JPS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment