Malware

About “Graftor.401766” infection

Malware Removal

The Graftor.401766 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.401766 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Anomalous binary characteristics

How to determine Graftor.401766?


File Info:

name: 9CDBDE135190B92D5A50.mlw
path: /opt/CAPEv2/storage/binaries/7c13bb145ab3ae37aabe0dcc6af3ac05b2904f3aacc1a52b23343d5349d0eb85
crc32: 706C31E5
md5: 9cdbde135190b92d5a50905f9b90107f
sha1: 62b9d8a3ef81206c1046d6400f2f4b0e8b11b060
sha256: 7c13bb145ab3ae37aabe0dcc6af3ac05b2904f3aacc1a52b23343d5349d0eb85
sha512: 5fa730cb82a39ba5bfab7d1353c8ee5376912cb6c8a3bbe4d11855a92fb34120601a26ad0d2920f53f0780c0ba38af5cccf4db205fa233b3237b7460b8b6585b
ssdeep: 12288:ZPzTp6eAc5QHYWZc/OstA/I13YPLF41xonwQZN2ArmBQs:ZPzTp35QHYCVwCnLF41inZZhiBQs
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C7E49D417BE1E132C26220F609E6E375696AAD20AB358AC777D03F3E1D306D15D3936B
sha3_384: f1654a476d5da680aac4a2ebee8828d1d76bb6e54da67616563a2e3765d06c1981dd4a89ac9c254c095b40e13135e7b8
ep_bytes: e9affafdffcccce80d10fcff85c0750a
timestamp: 1988-03-05 03:19:33

Version Info:

CompanyName: 四三九九网络股份有限公司
FileDescription: 4399刺秦秘史
FileVersion: cqms-qpb3-zddl
InternalName: Cq69676.exe
LegalCopyright: 四三九九网络股份有限公司 保留所有权利。
OriginalFilename: Cq69676.exe
ProductName: 4399刺秦秘史
ProductVersion: cqms-qpb3-zddl
Translation: 0x0804 0x03a8

Graftor.401766 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Graftor.401766
FireEyeGeneric.mg.9cdbde135190b92d
McAfeeGeneric-FAGI!9CDBDE135190
CylanceUnsafe
K7AntiVirusUnwanted-Program ( 0054181a1 )
K7GWUnwanted-Program ( 0054181a1 )
Cybereasonmalicious.35190b
BitDefenderThetaGen:NN.ZexaF.34062.Ru1@a8WXiHbj
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GameTool.FL potentially unsafe
AvastWin32:Malware-gen
CynetMalicious (score: 100)
Kasperskynot-a-virus:HEUR:Downloader.Win32.Generic
BitDefenderGen:Variant.Graftor.401766
NANO-AntivirusTrojan.Win32.Razy.exalnl
TencentMalware.Win32.Gencirc.10b7072e
Ad-AwareGen:Variant.Graftor.401766
SophosGeneric ML PUA (PUA)
McAfee-GW-EditionGeneric-FAGI!9CDBDE135190
EmsisoftGen:Variant.Graftor.401766 (B)
GDataGen:Variant.Graftor.401766
JiangminDownloader.Generic.aqxp
AviraTR/Patched.Gen
Antiy-AVLTrojan/Generic.ASMalwS.245FC32
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3Malware/Win32.RL_Generic.R278330
ALYacGen:Variant.Graftor.401766
MAXmalware (ai score=83)
VBA32BScope.Trojan.Downloader
MalwarebytesMalware.AI.2699678369
APEXMalicious
RisingMalware.Heuristic!ET#99% (RDMK:cmRtazptFN5w8qIaa7DCwezRhWoP)
YandexTrojan.GenAsa!IjnaRrMidfQ
SentinelOneStatic AI – Malicious PE
AVGWin32:Malware-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_80% (D)

How to remove Graftor.401766?

Graftor.401766 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment