Malware

What is “Win32:Explosive-G [Trj]”?

Malware Removal

The Win32:Explosive-G [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Explosive-G [Trj] virus can do?

    How to determine Win32:Explosive-G [Trj]?

    
    

    File Info:

    crc32: 90CC8C66
    md5: c19e91a91a2fa55e869c42a70da9a506
    name: b275c8978d18832bd3da9975d0f43cbc90e09a99718f4efaf1be7b43db46cf95
    sha1: 804e4fb9aa66eb3aad967e485f0273f3936c6a24
    sha256: b275c8978d18832bd3da9975d0f43cbc90e09a99718f4efaf1be7b43db46cf95
    sha512: db33a16e8488145b795717e58ccfbf9528478e51ecc52f57ce4df8d6f4cfa3dd9dfd25e8f8c6e248ff25e0afe4baeec660d44c0b76a71231ec4a5931d090931d
    ssdeep: 1536:HKYtidWRWFcB7bttSVHM0OraO73bHb6usR3J/GFNneDqnVjrI9Yo8ZmPkhMGlYjO:HvqIZhtsHM0iuEHVw98ZqglYjO
    type: PE32 executable (GUI) Intel 80386, for MS Windows

    Version Info:

    LegalCopyright: xa9 Microsoft Corporation. All rights reserved.
    InternalName: rundll32.exe
    FileVersion: 2, 0, 0, 1
    CompanyName: Microsoft Corporation
    ProductName: Windows Help Service
    ProductVersion: 2, 0, 0, 1
    FileDescription: Windows Help Service
    OriginalFilename: rundll32.exe
    Translation: 0x0409 0x04b0

    Win32:Explosive-G [Trj] also known as:

    BkavW32.EncapterLTP.Trojan
    MicroWorld-eScanGen:Variant.Zusy.135184
    FireEyeGeneric.mg.c19e91a91a2fa55e
    ALYacGen:Variant.Zusy.135184
    CylanceUnsafe
    VIPRETrojan.Win32.Generic!BT
    SangforMalware
    K7AntiVirusTrojan ( 0055e3dd1 )
    BitDefenderGen:Variant.Zusy.135184
    K7GWTrojan ( 0055e3dd1 )
    Cybereasonmalicious.91a2fa
    TrendMicroBKDR_EXPLOSIVE.A
    BitDefenderThetaGen:NN.ZexaF.34090.hq1@aeYvijni
    CyrenW32/Explosive.C.gen!Eldorado
    TrendMicro-HouseCallBKDR_EXPLOSIVE.A
    AvastWin32:Explosive-G [Trj]
    ClamAVWin.Trojan.Explosive-6538489-0
    GDataGen:Variant.Zusy.135184
    KasperskyHEUR:Trojan.Win32.Generic
    AlibabaTrojan:Win32/Hokobot.785533a8
    NANO-AntivirusTrojan.Win32.Explosive.dqdpmk
    ViRobotTrojan.Win32.Explosive.123410
    AegisLabTrojan.Win32.Generic.4!c
    APEXMalicious
    RisingTrojan.Agent!8.B1E (CLOUD)
    Ad-AwareGen:Variant.Zusy.135184
    SophosTroj/Explos-A
    ComodoMalware@#6ddqrqnbos0l
    F-SecureTrojan.TR/Agent.123409
    DrWebTrojan.PWS.Stealer.27245
    ZillyaTrojan.Explosive.Win32.1
    McAfee-GW-EditionBehavesLike.Win32.Dropper.ch
    EmsisoftGen:Variant.Zusy.135184 (B)
    SentinelOneDFI – Malicious PE
    F-ProtW32/Explosive.C.gen!Eldorado
    JiangminTrojan/Explosive.k
    AviraTR/Agent.123409
    MAXmalware (ai score=100)
    Antiy-AVLTrojan/Win32.AGeneric
    Endgamemalicious (high confidence)
    ArcabitTrojan.Zusy.D21010
    ZoneAlarmHEUR:Trojan.Win32.Generic
    MicrosoftTrojan:Win32/Hokobot.B!dha
    AhnLab-V3Trojan/Win32.Agent.C779381
    Acronissuspicious
    McAfeeGeneric.dgg
    VBA32Trojan.Explosive
    PandaTrj/Genetic.gen
    ESET-NOD32a variant of Win32/Agent.PTM
    TencentWin32.Trojan.Generic.Sxek
    YandexTrojan.Explosive!
    IkarusTrojan.Win32.Hokobot
    eGambitTrojan.Generic
    FortinetW32/Generic.AC.4160D8
    WebrootW32.Trojan.Gen
    AVGWin32:Explosive-G [Trj]
    Paloaltogeneric.ml
    CrowdStrikewin/malicious_confidence_60% (W)
    Qihoo-360Win32/Trojan.2d1

    How to remove Win32:Explosive-G [Trj]?

    Win32:Explosive-G [Trj] removal tool
    • Download and install GridinSoft Anti-Malware.
    • Open GridinSoft Anti-Malware and perform a “Standard scan“.
    • Move to quarantine” all items.
    • Open “Tools” tab – Press “Reset Browser Settings“.
    • Select proper browser and options – Click “Reset”.
    • Restart your computer.

    About the author

    Paul Valéry

    I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

    Leave a Comment