Worm

Worm:Win32/Eggnog!pz removal guide

Malware Removal

The Worm:Win32/Eggnog!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm:Win32/Eggnog!pz virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Worm:Win32/Eggnog!pz?


File Info:

name: 432641CD0D6CC24187E0.mlw
path: /opt/CAPEv2/storage/binaries/e45ca33966b63c4e0614afb0fe28fd2c64854e2a15d5e022808c1cd84af54152
crc32: 05BBBC61
md5: 432641cd0d6cc24187e0e697429451b7
sha1: ee1488be5ae50c1d677bbeaa96b491299a7459e9
sha256: e45ca33966b63c4e0614afb0fe28fd2c64854e2a15d5e022808c1cd84af54152
sha512: 6210707d3d97591bf128c52c5b812e510f287e6bc18678ba03caae99d8cb95d69340777b4aab7cb5e7f8206013cf80d3189fbb40dcd142d0a512ba0dc3936cc7
ssdeep: 768:ooixwqZOoQs1oRAqvQi+AFN2T6rH8E9+3KYR8BrvqVWn3Nyuk2fd7ML:ovKqZZQs1ShQi7+q0birvqVO9yuz1gL
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A213AF03F2D1D972C050D5FE9D07B528EB7B3A203E9844A36AF52FCE6D1A2505D2D29B
sha3_384: 14db94f9f3b562a209b7326598fffccc9c03abf84ec9216271e411b94cb1c91a039cf34ed1131cc6d6d2d21f43f5d0ed
ep_bytes: 558bec83c4f053b8346f4000e85fd4ff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Worm:Win32/Eggnog!pz also known as:

BkavW32.FamVT.EggogK.Worm
MicroWorld-eScanGen:Trojan.P2P-Worm.cGY@aa4wiCi
CAT-QuickHealWorm.Eggnog.S28830318
SkyhighBehavesLike.Win32.Eggnog.ph
McAfeeW32/Eggnog.worm.gen
MalwarebytesGeneric.Trojan.Delf.DDS
VIPREGen:Trojan.P2P-Worm.cGY@aa4wiCi
SangforTrojan.Win32.Save.a
K7AntiVirusEmailWorm ( 005a7b871 )
K7GWTrojan ( 000a4e6a1 )
CrowdStrikewin/malicious_confidence_100% (D)
BaiduWin32.Worm.Eggnog.a
VirITTrojan.Win32.Generic.BBBU
SymantecW32.Nofer.A@mm
Elasticmalicious (high confidence)
ESET-NOD32Win32/Eggnog.E
APEXMalicious
ClamAVWin.Worm.Eggnog-1
KasperskyP2P-Worm.Win32.Eggnog.f
BitDefenderGen:Trojan.P2P-Worm.cGY@aa4wiCi
NANO-AntivirusTrojan.Win32.Eggnog.qxemv
AvastWin32:WormX-gen [Wrm]
TencentWorm.Win32.Eggnog.a
EmsisoftGen:Trojan.P2P-Worm.cGY@aa4wiCi (B)
F-SecureDropper.DR/Delphi.Gen
DrWebWin32.HLLW.Google.24577
ZillyaTrojan.Cospet.Win32.221
TrendMicroWORM_EGGNOG.SMI
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.432641cd0d6cc241
SophosW32/Eggnog-Fam
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=81)
GDataWin32.Worm.Fearso.A
JiangminTrojan/Cospet.gv
WebrootW32.Worm.Eggnog.Gen
GoogleDetected
AviraDR/Delphi.Gen
VaristW32/Eggnog.A.gen!Eldorado
Antiy-AVLWorm[P2P]/Win32.Eggnog
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Cospet.X0@1mafpo
ArcabitTrojan.P2P-Worm.E48FE6
ViRobotWorm.Win32.A.P2P-Eggnog.36850
ZoneAlarmP2P-Worm.Win32.Eggnog.f
MicrosoftWorm:Win32/Eggnog!pz
CynetMalicious (score: 100)
AhnLab-V3Worm/Win32.Eggnog.R66977
Acronissuspicious
BitDefenderThetaAI:Packer.F39AB5E321
ALYacGen:Trojan.P2P-Worm.cGY@aa4wiCi
VBA32BScope.Worm.Pluto
Cylanceunsafe
PandaGeneric Malware
TrendMicro-HouseCallWORM_EGGNOG.SMI
RisingWorm.Eggnog!1.E840 (CLASSIC)
YandexTrojan.GenAsa!9WQyNROzKr8
IkarusWorm.Win32.Eggnog
MaxSecureWorm.W32.Eggnog.F
FortinetW32/Eggnog.E!worm
AVGWin32:WormX-gen [Wrm]
Cybereasonmalicious.e5ae50
DeepInstinctMALICIOUS

How to remove Worm:Win32/Eggnog!pz?

Worm:Win32/Eggnog!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment