The Generic.Dacic.635FDBB5.A.2E7C3A9C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
Gridinsoft Anti-Malware
Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
What Generic.Dacic.635FDBB5.A.2E7C3A9C virus can do?
- Behavioural detection: Executable code extraction – unpacking
- Sample contains Overlay data
- Presents an Authenticode digital signature
- Uses Windows utilities for basic functionality
- HTTPS urls from behavior.
- CAPE extracted potentially suspicious content
- Drops a binary and executes it
- The binary likely contains encrypted or compressed data.
- Authenticode signature is invalid
- Uses Windows utilities to create a scheduled task
- CAPE detected the MetaStealer malware family
- Attempts to identify installed AV products by installation directory
- Binary file triggered YARA rule
- Attempts to modify proxy settings
- Appears to use command line obfuscation
- Deletes executed files from disk
- Anomalous binary characteristics
- Uses suspicious command line tools or Windows utilities
- Yara detections observed in process dumps, payloads or dropped files
How to determine Generic.Dacic.635FDBB5.A.2E7C3A9C?
File Info:
name: 79D3F3BC314F23D21EFF.mlwpath: /opt/CAPEv2/storage/binaries/6cb1f82b85af9acb5c3a3ab994ab94180e3a1db4a597d1622bf49bc1a3de8750crc32: 403D313Cmd5: 79d3f3bc314f23d21eff857ab34ba573sha1: 87a5707f57be5850cdddfa831089bb3a59414542sha256: 6cb1f82b85af9acb5c3a3ab994ab94180e3a1db4a597d1622bf49bc1a3de8750sha512: fbefacbbb89af15b084c2a394d928e6ceead098290b3b05ac77c0b5f354d6e2f24a83a23982619cf996a508a9b1b73be4cdf336c341202255b131cc849dca012ssdeep: 6144:qQef0CTELmBcnOY5P3m88BtK3wxU9TlVS+iEC9cNYF8Vxa2zGhS/Gtdpk+OedhXe:qQCThxQ2PBsVZDD55KFAAdp5OLtype: PE32 executable (console) Intel 80386, for MS Windowstlsh: T17FB4022E786041B1D97BD8BDF8F79D53B7BC5C32122413B3D26012AA1FA2AE1356711Bsha3_384: dd53ec3311d1e448c6e7462fb31a0aa43877dee01637e34d362924b8d61e5702e66f0cb3c2c1744e73dff580d7626624ep_bytes: e8173c0000e9a4feffff3b0d3cd94700timestamp: 1970-01-01 00:00:00Version Info:
Comments: This is a legitimate application.CompanyName: American Colla USAFileDescription: American Colla USA ProductFileVersion: 945InternalName: 2CWm9P89OkGrLegalCopyright: © American Colla USA All rights reserved.LegalTrademarks: © American Colla USA TrademarksOriginalFilename: 2ryoToyK.exeProductName: mteHpYSWUjProductVersion: 945Translation: 0x0407 0x04b0
Generic.Dacic.635FDBB5.A.2E7C3A9C also known as:
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Stealer.12!c |
MicroWorld-eScan | Generic.Dacic.635FDBB5.A.2E7C3A9C |
FireEye | Generic.mg.79d3f3bc314f23d2 |
Skyhigh | GenericRXWF-QY!79D3F3BC314F |
McAfee | GenericRXWF-QY!79D3F3BC314F |
Malwarebytes | Spyware.RedLineStealer |
Zillya | Trojan.Stealer.Win32.131222 |
Sangfor | Trojan.Win32.Save.a |
Alibaba | TrojanSpy:Win32/RedLineStealer.1e72704f |
K7GW | Riskware ( 00584baa1 ) |
K7AntiVirus | Trojan ( 005a99e81 ) |
VirIT | Trojan.Win32.Genus.RSW |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Kryptik.HUJS |
APEX | Malicious |
TrendMicro-HouseCall | TROJ_GEN.R002C0DBC24 |
Paloalto | generic.ml |
ClamAV | Win.Packed.Zpack-10005470-0 |
Kaspersky | HEUR:Trojan-Spy.Win32.Stealer.gen |
BitDefender | Generic.Dacic.635FDBB5.A.2E7C3A9C |
NANO-Antivirus | Trojan.Win32.Stealer.jxdpzv |
Avast | Win32:PWSX-gen [Trj] |
Tencent | Trojan.Win32.Kryptik.16000702 |
Emsisoft | Generic.Dacic.635FDBB5.A.2E7C3A9C (B) |
F-Secure | Trojan.TR/Crypt.ZPACK.Gen4 |
DrWeb | Trojan.PWS.RedLineNET.7 |
VIPRE | Generic.Dacic.635FDBB5.A.2E7C3A9C |
TrendMicro | TROJ_GEN.R002C0DBC24 |
Trapmine | malicious.high.ml.score |
Sophos | Troj/Krypt-AAD |
SentinelOne | Static AI – Malicious PE |
MAX | malware (ai score=88) |
Jiangmin | TrojanDownloader.Deyma.aqw |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Crypt.ZPACK.Gen4 |
Varist | W32/Kryptik.KCQ.gen!Eldorado |
Antiy-AVL | Trojan/Win32.Kryptik.htvt |
Kingsoft | Win32.Trojan-Spy.Stealer.gen |
Microsoft | Trojan:Win32/RedLineStealer.L!MTB |
Xcitium | Malware@#1jf37qzop4y7b |
Arcabit | Generic.Dacic.635FDBB5.A.2E7C3A9C |
ZoneAlarm | HEUR:Trojan-Spy.Win32.Stealer.gen |
GData | Win32.Trojan.PSE.FNGDKA |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Generic.R589377 |
BitDefenderTheta | Gen:NN.ZexaF.36804.Gq2@aGOaAGmi |
ALYac | Generic.Dacic.635FDBB5.A.2E7C3A9C |
VBA32 | Trojan.Kryptik |
Cylance | unsafe |
Panda | Trj/Genetic.gen |
Rising | Trojan.Kryptik!1.E841 (CLASSIC) |
Ikarus | Trojan.Win32.Crypt |
MaxSecure | Trojan.W32.Injurer.gen |
Fortinet | W32/Kryptik.HTVT!tr |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |
alibabacloud | Malware |
How to remove Generic.Dacic.635FDBB5.A.2E7C3A9C?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment