Malware

Graftor.33990 (B) information

Malware Removal

The Graftor.33990 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.33990 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • A process attempted to delay the analysis task.
  • Loads a driver
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering

How to determine Graftor.33990 (B)?


File Info:

name: FE9D3DDA9C0E85777362.mlw
path: /opt/CAPEv2/storage/binaries/a80383536fd5802af74b8934e897a594d84c074fb9c592e0a85b74329b62b4ee
crc32: 8520DF51
md5: fe9d3dda9c0e85777362108cd023f7ec
sha1: 6dd52976e847da761b0cf0554eb7cea698489979
sha256: a80383536fd5802af74b8934e897a594d84c074fb9c592e0a85b74329b62b4ee
sha512: a9b864dbe4c81b444908a48a6dbb648bc7e4daf1a75a460d3c73d5ed1b5dc93d0c2a4a302dfc223c4a5b76f49dfec017e38ac93f4b88af9177910f354410b4cd
ssdeep: 196608:1r3doYlPXY353ikhePubbI0INVff+d6NuksANRR9pF5fg:HRPXq3VeOc0Irf9uRANnFlg
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BB962355F190C0FAC72D1830346E1775BB68A6D11B308AC3AFB9FE7D2A3165DCA36258
sha3_384: 387fef5996f10f2e38b9f68804f762c274b18e6a24b8cddcf44ac148cb04be6b571633e6e9e6415f4a77c1af0f796397
ep_bytes: 558bec6aff68c828cc0068580f480064
timestamp: 2022-04-23 03:41:00

Version Info:

FileVersion: 1.0.0.0
FileDescription: 此软件为檬凉免费分享/若你是付费获取/那么恭喜你被圈了!
ProductName: 浮空助手
ProductVersion: 1.0.0.0
CompanyName: 檬凉
LegalCopyright: 此软件为檬凉免费分享/若你是付费获取/那么恭喜你被圈了!
Comments: 此软件为檬凉免费分享/若你是付费获取/那么恭喜你被圈了!
Translation: 0x0804 0x04b0

Graftor.33990 (B) also known as:

BkavW32.AIDetect.malware2
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Graftor.33990
ALYacGen:Variant.Graftor.33990
CylanceUnsafe
Sangfor[ARMADILLO V1.71]
K7AntiVirusTrojan ( 005246d51 )
K7GWTrojan ( 005246d51 )
CyrenW32/Trojan.CLL.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEXMalicious
BitDefenderGen:Variant.Graftor.33990
Ad-AwareGen:Variant.Graftor.33990
EmsisoftGen:Variant.Graftor.33990 (B)
ComodoWorm.Win32.Dropper.RA@1qraug
McAfee-GW-EditionBehavesLike.Win32.Generic.rc
FireEyeGeneric.mg.fe9d3dda9c0e8577
SophosGeneric ML PUA (PUA)
GDataWin32.Trojan.PSE.15PTMPD
JiangminTrojanDropper.Binder.boy
MAXmalware (ai score=84)
ArcabitTrojan.Graftor.D84C6
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.HDC.C1017548
VBA32BScope.Adware.Agent
MalwarebytesTrojan.MalPack.FlyStudio
RisingTrojan.MalCert!1.C2EF (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/CoinMiner.65CA!tr
BitDefenderThetaGen:NN.ZexaF.34638.@t0@aajSyhkb
Cybereasonmalicious.a9c0e8

How to remove Graftor.33990 (B)?

Graftor.33990 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment