Categories: Malware

About “Application.KeyLogger.QSH” infection

The Application.KeyLogger.QSH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.KeyLogger.QSH virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Sniffs keystrokes
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Uses suspicious command line tools or Windows utilities

How to determine Application.KeyLogger.QSH?


File Info:

name: 7B279F044899A70C8160.mlwpath: /opt/CAPEv2/storage/binaries/5a63a5ba7e5ff83bf9ce0ccadbde0a678805c3d4831b182e256e54b16e9898aacrc32: 3A4DF344md5: 7b279f044899a70c81606a4809b19034sha1: 12fa972f6795704d07c16f46e639dd6a484c712fsha256: 5a63a5ba7e5ff83bf9ce0ccadbde0a678805c3d4831b182e256e54b16e9898aasha512: 018bb80b6f3bec4ea8a10bd3d5e7e62d5de893f620f4148a4bd6e4830af2827f38411c176f9ba33aa98cd6e57c731ec7717655a74c00502aadeccb03635524dassdeep: 12288:L20i1QtLmN+CEMJB+fVG1qDpD+gAF7rmvgLsF11VsC/I:L20ECLlCadG1q9D+gY7rmvZf5/Itype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T180C42307E3E19878F1A29D70AE22D517963B3C3698302C6C749C1ECE9F7355B988A353sha3_384: 851ed8852e6226c27cd248e6d386e7f0e3a58d9ca5fd33f771d929b7f6a843cdceac8ce517a91976a6aa6f22585d0ad1ep_bytes: 558bec83c4c453565733c08945f08945timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.CompanyName: FileDescription: Keyboard Logger Setup FileVersion: LegalCopyright: ProductName: Keyboard Logger ProductVersion: Translation: 0x0000 0x04b0

Application.KeyLogger.QSH also known as:

Lionic Riskware.Win32.KeyLogger.1!c
DrWeb Tool.KeyHook
MicroWorld-eScan Application.KeyLogger.QSH
FireEye Application.KeyLogger.QSH
ALYac Application.KeyLogger.QSH
K7AntiVirus Password-Stealer ( 004f41331 )
Alibaba RiskWare:Win32/KeyLogger.5fb76403
K7GW Password-Stealer ( 004f41331 )
Cybereason malicious.44899a
VirIT Trojan.Win32.Agent.TZZ
Cyren W32/Trojan.WOWY-4051
Symantec Spyware.Keylogger
ESET-NOD32 Win32/KeyLogger.KeyboardLogger
TrendMicro-HouseCall SPYWARE_KEYL_FINGERPRINTS
Kaspersky not-a-virus:Monitor.Win32.KeyLogger.alu
BitDefender Application.KeyLogger.QSH
NANO-Antivirus Riskware.Win32.KeyHook.ddymei
Avast Win32:KeyLogger-AFG [PUP]
Tencent Win32.Risk.Keylogger.Ahop
Emsisoft Application.KeyLogger.QSH (B)
Comodo Malware@#343i2rxpbw5zg
Zillya Tool.KeyLogger.Win32.3010
TrendMicro SPYWARE_KEYL_FINGERPRINTS
McAfee-GW-Edition BehavesLike.Win32.AdwareFileTour.hc
Sophos Generic Reputation PUA (PUA)
GData Application.KeyLogger.QSH
Webroot W32.Malware.Gen
MAX malware (ai score=100)
Kingsoft Win32.Troj.Agent.jf.(kcloud)
ZoneAlarm not-a-virus:Monitor.Win32.KeyLogger.alu
Microsoft Trojan:Win32/Occamy.C5A
McAfee Artemis!7B279F044899
Cylance Unsafe
Rising Trojan.Spy.KeySpy.a (CLOUD)
Yandex TrojanSpy.Agent!d3B2OJOeS/s
MaxSecure Trojan.Malware.2136500.susgen
Fortinet Riskware/KeyLogger
AVG Win32:KeyLogger-AFG [PUP]
CrowdStrike win/grayware_confidence_100% (W)

How to remove Application.KeyLogger.QSH?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

W32/SillyFDC-GT removal guide

The W32/SillyFDC-GT is considered dangerous by lots of security experts. When this infection is active,…

6 mins ago

Generic.Dacic.1206.5BCB2804 removal instruction

The Generic.Dacic.1206.5BCB2804 is considered dangerous by lots of security experts. When this infection is active,…

12 mins ago

MSIL/Kryptik.OM removal instruction

The MSIL/Kryptik.OM is considered dangerous by lots of security experts. When this infection is active,…

16 mins ago

Trojan:MSIL/PureLogs.SK!MTB removal

The Trojan:MSIL/PureLogs.SK!MTB is considered dangerous by lots of security experts. When this infection is active,…

16 mins ago

Trojan:MSIL/AgentTesla.PSXP!MTB removal instruction

The Trojan:MSIL/AgentTesla.PSXP!MTB is considered dangerous by lots of security experts. When this infection is active,…

16 mins ago

About “IL:Trojan.MSILZilla.33267” infection

The IL:Trojan.MSILZilla.33267 is considered dangerous by lots of security experts. When this infection is active,…

22 mins ago