The Dropped:Generic.Dacic.304514EE.A.BA5E6990 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
Gridinsoft Anti-Malware
Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
What Dropped:Generic.Dacic.304514EE.A.BA5E6990 virus can do?
- A file was accessed within the Public folder.
- Sample contains Overlay data
- Reads data out of its own binary image
- CAPE extracted potentially suspicious content
- Drops a binary and executes it
- The binary contains an unknown PE section name indicative of packing
- The binary likely contains encrypted or compressed data.
- Authenticode signature is invalid
- Uses Windows utilities to create a scheduled task
- Behavioural detection: Injection (inter-process)
- CAPE detected the embedded win api malware family
- Anomalous binary characteristics
- Yara detections observed in process dumps, payloads or dropped files
How to determine Dropped:Generic.Dacic.304514EE.A.BA5E6990?
File Info:
name: B92BFB61665CB25CC435.mlwpath: /opt/CAPEv2/storage/binaries/eb610168268886e3e7b1d18df94881b8979a9d2ca1c4a4ef741bc7d109b1db0acrc32: FB63F7C6md5: b92bfb61665cb25cc4357bdc1275a7adsha1: 56f239a873275cf04a98e91cd90d14839f5da31dsha256: eb610168268886e3e7b1d18df94881b8979a9d2ca1c4a4ef741bc7d109b1db0asha512: dee57eb570b3d26c8b6ac592fc27fd310d4d83e89278c9fca2212bb06869c1618dde8de6bd10d96254fe43cf70e7253c617fccb0f0b442f5cb490429f9eb2416ssdeep: 12288:tWsm+95nHfF2mgewFX5Qvhh9ZxEXpdNgj6UVZrOjNCRUVi:tWsz95ndbgfX52x4d2NVZrOjNCRUVitype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T16FC4E115B696C232E1C202370E66CBB6992ABC351B2B65C763E0E36D6F317D1DB71306sha3_384: d430be9bffe4654b2324ccbf8e645e881f69eebaf4fe47bb6589ed1b49833d96b47499696e9380f74085cdbe24380283ep_bytes: e8d9650000e989feffff8bff558bec5dtimestamp: 2001-05-16 13:49:22Version Info:
CompanyName: Microsoft CorporationFileDescription: Microsoft Office WordFileVersion: 12.0.4518.1014InternalName: WinWordLegalCopyright: © 2006 Microsoft Corporation. All rights reserved.LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.OriginalFilename: WinWord.exeProductName: 2007 Microsoft Office systemProductVersion: 12.0.4518.1014Translation: 0x0000 0x04e4
Dropped:Generic.Dacic.304514EE.A.BA5E6990 also known as:
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Salgorea.tpto |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Siggen6.24701 |
MicroWorld-eScan | Dropped:Generic.Dacic.304514EE.A.BA5E6990 |
FireEye | Generic.mg.b92bfb61665cb25c |
CAT-QuickHeal | Trojan.GenericPMF.S31887376 |
Skyhigh | BehavesLike.Win32.Generic.hc |
McAfee | GenericRXLH-OM!B92BFB61665C |
Cylance | unsafe |
Zillya | Backdoor.Salgorea.Win32.146 |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Trojan:Win32/Salgorea.379 |
K7GW | Trojan ( 004e16831 ) |
K7AntiVirus | Trojan ( 004e16831 ) |
BitDefenderTheta | Gen:NN.ZexaF.36804.IW2@aapc25hi |
VirIT | Trojan.Win32.Salgorea.A |
Paloalto | generic.ml |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | a variant of Win32/TrojanDropper.Agent.RHG |
APEX | Malicious |
TrendMicro-HouseCall | TROJ_GEN.R002C0DD124 |
Avast | Win32:Agent-AYZG [Cryp] |
ClamAV | Win.Malware.Bskd-9753126-0 |
Kaspersky | Backdoor.Win32.Salgorea.a |
BitDefender | Dropped:Generic.Dacic.304514EE.A.BA5E6990 |
NANO-Antivirus | Trojan.Win32.Agent.djzunh |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
Tencent | Backdoor.Win32.Salgorea.hg |
Emsisoft | Dropped:Generic.Dacic.304514EE.A.BA5E6990 (B) |
Detected | |
F-Secure | Trojan.TR/Crypt.ZPACK.Gen4 |
VIPRE | Dropped:Generic.Dacic.304514EE.A.BA5E6990 |
TrendMicro | TROJ_GEN.R002C0DD124 |
Trapmine | suspicious.low.ml.score |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Dropper.Win32.Agent |
Jiangmin | TrojanDropper.Agent.brds |
Varist | W32/Agent.IOO.gen!Eldorado |
Avira | TR/Crypt.ZPACK.Gen4 |
MAX | malware (ai score=82) |
Antiy-AVL | Trojan[Backdoor]/Win32.Salgorea.gen |
Kingsoft | Win32.Hack.Salgorea.a |
Microsoft | Trojan:Win32/Cerber.MPI!MTB |
Xcitium | TrojWare.Win32.Agent.QGO@57p1tw |
Arcabit | Generic.Dacic.304514EE.A.BA5E6990 |
ZoneAlarm | Backdoor.Win32.Salgorea.a |
GData | Win32.Trojan.Salgorea.B |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.OM.C5537737 |
Acronis | suspicious |
VBA32 | Backdoor.Salgorea |
ALYac | Dropped:Generic.Dacic.304514EE.A.BA5E6990 |
TACHYON | Trojan/W32.Agent.559098.C |
Malwarebytes | Wapomi.Virus.FileInfector.DDS |
Panda | Trj/Genetic.gen |
Rising | Backdoor.[OceanLotus]Salgorea!1.C3DC (CLASSIC) |
SentinelOne | Static AI – Malicious PE |
MaxSecure | Trojan.Malware.12252991.susgen |
Fortinet | W32/Agent.AYZG!tr |
AVG | Win32:Agent-AYZG [Cryp] |
DeepInstinct | MALICIOUS |
alibabacloud | Backdoor:Win/Salgorea.A(dyn) |
How to remove Dropped:Generic.Dacic.304514EE.A.BA5E6990?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment