Malware

How to remove “Win32/Pronny.AH”?

Malware Removal

The Win32/Pronny.AH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Pronny.AH virus can do?

  • Executable code extraction
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to disable Windows Auto Updates
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

Related domains:

ns1.spansearcher.net

How to determine Win32/Pronny.AH?


File Info:

crc32: 84E45FF8
md5: 8d278d05c3bf989f976bf2ee978bc7d8
name: 8D278D05C3BF989F976BF2EE978BC7D8.mlw
sha1: dcaed1a9adbf093954f706328c2bfc97889bd596
sha256: 144a8277320385edc6e3b3bd6f1dc59d1b531efbf25e5e01a0296f5b0fec47d9
sha512: b0550786ae7cfda7bc222a6f527b3c2b5adb33a00846787006e471d03289ccbcf18bc20503507eef348a227941f0b86a1fde842dbee4a8d4450d49c2419d4382
ssdeep: 3072:smiW8zh0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUW9M:XXS4QxL7B9W0c1RCzR/fSmlr
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Pronny.AH also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.VBInject.11
FireEyeGeneric.mg.8d278d05c3bf989f
CAT-QuickHealTrojan.Beebone.D
McAfeeW32/Autorun.worm.aacp
CylanceUnsafe
SangforMalware
K7AntiVirusEmailWorm ( 0054d10f1 )
BitDefenderGen:Variant.VBInject.11
K7GWEmailWorm ( 0054d10f1 )
Cybereasonmalicious.5c3bf9
BitDefenderThetaGen:NN.ZevbaF.34804.mmW@aK8k!ng
CyrenW32/Vobfus.AV.gen!Eldorado
SymantecW32.Changeup
ESET-NOD32Win32/Pronny.AH
BaiduWin32.Worm.Pronny.h
APEXMalicious
AvastWin32:VB-ACNV [Trj]
ClamAVWin.Trojan.Changeup-6169544-0
KasperskyWorm.Win32.WBNA.ipa
AlibabaWorm:Win32/Vobfus.9d4bc951
NANO-AntivirusTrojan.Win32.WBNA.cqkxpg
ViRobotWorm.Win32.A.WBNA.208896.H
AegisLabWorm.Win32.WBNA.lweQ
Ad-AwareGen:Variant.VBInject.11
SophosMal/Generic-R + Mal/SillyFDC-X
ComodoWorm.Win32.Pronny.AK@4p6cu6
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Autoruner1.15026
VIPRETrojan.Win32.Vobfus.a (v)
TrendMicroTROJ_AGENT_025858.TOMB
McAfee-GW-EditionBehavesLike.Win32.Autorun.dm
EmsisoftGen:Variant.VBInject.11 (B)
SentinelOneStatic AI – Malicious PE – Worm
JiangminTrojan/Generic.atdee
eGambitUnsafe.AI_Score_100%
AviraTR/Dropper.Gen
MAXmalware (ai score=89)
Antiy-AVLWorm/Win32.WBNA.gen
MicrosoftWorm:Win32/Vobfus.EQ
ArcabitTrojan.VBInject.11
SUPERAntiSpywareTrojan.Agent/Gen-Spambot
AhnLab-V3Trojan/Win32.Jorik.R25690
ZoneAlarmWorm.Win32.WBNA.ipa
GDataGen:Variant.VBInject.11
CynetMalicious (score: 100)
TotalDefenseWin32/Vobfus.ADE
VBA32SScope.Malware-Cryptor.VBCR.3042
ALYacGen:Variant.VBInject.11
TACHYONWorm/W32.WBNA.208896.B
MalwarebytesVobfus.Worm.Evasion.DDS
PandaGeneric Malware
TrendMicro-HouseCallTROJ_AGENT_025858.TOMB
RisingWorm.VobfusEx!1.99E1 (CLASSIC)
YandexTrojan.GenAsa!KnbUZ/Nfsmk
IkarusTrojan.Win32.Jorik
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/VBObfus.AU!tr
AVGWin32:VB-ACNV [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Win32/Worm.3d4

How to remove Win32/Pronny.AH?

Win32/Pronny.AH removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment