TR/Crypt.ZPACK.Gen8 Description

Type: Trojan

TR.crypt.zpack.gen8 is a Trojan that invades the vulnerable computer system secretly without a PC user's permission and knowledge. TR/Crypt.ZPACK.Gen8 enables cybercriminals to obtain remote unauthorized access and control of the targeted PC. TR/Crypt.ZPACK.Gen8 can steal the victim's personal information such as credit card number, bank account and social security number and confidential data collected on the attacked computer system. TR/Crypt.ZPACK.Gen8 records all information on the corrupted workstation and sends gathered data to a remote server.


15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
AVG Generic29.CAWL
Fortinet W32/Foreign.RGR!tr
Ikarus Trojan-Ransom.Win32.Foreign
Kaspersky Trojan-Ransom.Win32.Foreign.rgr
K7AntiVirus Trojan
McAfee Generic Downloader.rk
Panda Trj/OCJ.B
Fortinet W32/Zbot.MZ!tr
Ikarus Trojan-Downloader.Win32.Andromeda
Comodo TrojWare.Win32.Trojan.Agent.Gen
Kaspersky Trojan-Downloader.Win32.Andromeda.dhn
Avast Win32:Kryptik-KQJ [Trj]
McAfee Artemis!FB0445C54DBC
Panda Trj/CI.A
Fortinet W32/Kryptik.ALRY!tr

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove TR/Crypt.ZPACK.Gen8

File System Details

TR/Crypt.ZPACK.Gen8 creates the following file(s):
# File Name MD5 Detection Count
1 SyncHostps.exe fb0445c54dbc4de43f871a7aea0bbd20 2
2 msifolicj.pif 0f0ae255fca95890969af6f91b46280b 1
3 6aacc95e.dll 0b2cf7d8d8d156e24d4ab0fe4060b8cd 1
4 ftcteol.dll 429893be989f010f177fb8afef36f09d 1
5 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run\TR.crypt.zpack.gen8 N/A
6 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\[RANDOM CHARACTERS] N/A
7 0086544097 51de9afe56c366f6036923332fe12edc 0
8 fb84ba97ce13291fefd49043b657852c.dll fb84ba97ce13291fefd49043b657852c 0
9 0086540839 e7ee2a44780538e705eb64f91030b5b1 0
10 0086548683 a6c0a603549f27bae3d531875c0a12b0 0
11 vt-upload-0oPiF cb7a1cff3820a29e8fd470b477c60df0 0

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.