Malware

Win32:Pronny-I [Trj] removal instruction

Malware Removal

The Win32:Pronny-I [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Pronny-I [Trj] virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • Attempts to disable Windows Auto Updates
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

How to determine Win32:Pronny-I [Trj]?


File Info:

name: AA84B88974C87D218433.mlw
path: /opt/CAPEv2/storage/binaries/c3d60915c761f66aba076ad4065c85877a3e74cac437f561d26b988b916376ed
crc32: AD9805AB
md5: aa84b88974c87d2184338fc29e1d56d1
sha1: 70ff335f574495e119f6438b375366780dccce06
sha256: c3d60915c761f66aba076ad4065c85877a3e74cac437f561d26b988b916376ed
sha512: 9ab2ba4dd80ee68b83d925f6271840983e0c20724e45ff0a66b2c950e43dad5c58b3924f751325b53b3daf4ce2b9a7e50bdeb072cc8a2825aeb87eba4c7585ea
ssdeep: 3072:UOjSJv3akjQdrgUDdCGAX31X7tlcxEHglJsd1/Ab32yZlOsQqO1j99MP:wakcdlcX31X7tlMGFTy6sQvg
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19444CE7F6E4144E4D15490F3EEABEB9D21F22864CB33A8D11F101B548867D5FAA3868F
sha3_384: d622a6c76c8326f4522bad2b758e7a593e38f37e611cfcf95aa6c1d112b365715a334be799c520263e36d9d4ee8d09bf
ep_bytes: 6834134000e8f0ffffff000000000000
timestamp: 2003-08-26 18:54:58

Version Info:

0: [No Data]

Win32:Pronny-I [Trj] also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Cerbu.167078
FireEyeGeneric.mg.aa84b88974c87d21
CAT-QuickHealTrojan.Beebone.D
ALYacGen:Variant.Cerbu.167078
MalwarebytesMalware.AI.1128043376
SangforTrojan.Win32.Save.a
K7AntiVirusEmailWorm ( 003c363a1 )
AlibabaWorm:Win32/Jorik.ce0c015c
K7GWEmailWorm ( 003c363a1 )
Cybereasonmalicious.974c87
BitDefenderThetaGen:NN.ZevbaF.36196.pmX@aWcMtjm
CyrenW32/Vobfus.O.gen!Eldorado
SymantecW32.Changeup
ESET-NOD32Win32/Pronny.AS
APEXMalicious
ClamAVWin.Trojan.Changeup-6169544-0
KasperskyTrojan.Win32.Jorik.Vobfus.cqaz
BitDefenderGen:Variant.Cerbu.167078
NANO-AntivirusTrojan.Win32.Jorik.crgjcy
ViRobotTrojan.Win32.Jorik.245760.D
AvastWin32:Pronny-I [Trj]
TencentTrojan.Win32.Jorik.hj
TACHYONTrojan/W32.VB-Jorik.253952.E
EmsisoftGen:Variant.Cerbu.167078 (B)
BaiduWin32.Worm.Pronny.gn
F-SecureTrojan.TR/Patched.Ren.Gen
DrWebWin32.HLLW.Autoruner1.15681
VIPREGen:Variant.Cerbu.167078
TrendMicroWORM_VOBFUS.SMDF1
McAfee-GW-EditionBehavesLike.Win32.VBObfus.dm
Trapminemalicious.high.ml.score
SophosW32/Vobfus-AH
SentinelOneStatic AI – Malicious PE
GoogleDetected
AviraTR/Patched.Ren.Gen
Antiy-AVLWorm/Win32.WBNA.gen
ArcabitTrojan.Cerbu.D28CA6
ZoneAlarmTrojan.Win32.Jorik.Vobfus.cqaz
GDataWin32.Trojan.PSE.10T9JN3
CynetMalicious (score: 100)
Acronissuspicious
VBA32Trojan.Vobfus
MAXmalware (ai score=88)
Cylanceunsafe
PandaGeneric Malware
TrendMicro-HouseCallWORM_VOBFUS.SMDF1
RisingWorm.Pronny!1.E3EA (CLASSIC)
YandexTrojan.GenAsa!HkTYGOaejjo
IkarusWin32.Outbreak
FortinetW32/Jorik.EGLG!tr
AVGWin32:Pronny-I [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32:Pronny-I [Trj]?

Win32:Pronny-I [Trj] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment