Categories: Malware

Should I remove “Heur.PonyStealer.jmKfoCIaZWaG”?

The Heur.PonyStealer.jmKfoCIaZWaG is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Heur.PonyStealer.jmKfoCIaZWaG virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • A process created a hidden window
  • Unconventionial language used in binary resources: Finnish
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Steals private information from local Internet browsers
  • Exhibits behavior characteristic of Pony malware
  • Collects information about installed applications
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed mail clients

How to determine Heur.PonyStealer.jmKfoCIaZWaG?


File Info:

crc32: 04F38D8Emd5: d12142c55cba2f7f59a44f863fe8ac68name: D12142C55CBA2F7F59A44F863FE8AC68.mlwsha1: 8bd7c0570e0e59c058bdf9b53a67724d3b93ad5fsha256: e0b69e64b7d1190b19dc67c8d87be4b1ec0356e18d1639dfbd8f361f6090791bsha512: 68291594dccd39aeba062cb511fc78825a7bd6ca0bd6e97523cf29f9300db3b4e7b6d1f0223cc8ec4ff894263dc5f720d2a96f96d10ce6a79006f683f08a986essdeep: 3072:nPcOonNS/h5E5iufXKpBYTLeEh4LOuC8h5sTgoE8k3hw74qKgS:UOcSp5E5iIXKpBYTLVh1uXh5sbJk3hwtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x040b 0x04b0InternalName: rigatoniFileVersion: 3.00.0005CompanyName: eCson ProductName: Jahres5ProductVersion: 3.00.0005OriginalFilename: rigatoni.exe

Heur.PonyStealer.jmKfoCIaZWaG also known as:

Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Heur.PonyStealer.jmKfoCIaZWaG
FireEye Generic.mg.d12142c55cba2f7f
ALYac Gen:Heur.PonyStealer.jmKfoCIaZWaG
Cylance Unsafe
K7AntiVirus Trojan ( 005117ca1 )
BitDefender Gen:Heur.PonyStealer.jmKfoCIaZWaG
K7GW Trojan ( 005117ca1 )
Cybereason malicious.55cba2
TrendMicro TSPY_HPFAREIT.SM4
Symantec ML.Attribute.HighConfidence
APEX Malicious
ClamAV Win.Dropper.Bifrost-7643040-0
Kaspersky Trojan.Win32.VBKryjetor.bmvi
Rising Worm.Picsys!8.157 (TFE:3:3FyIIRhJBxL)
Ad-Aware Gen:Heur.PonyStealer.jmKfoCIaZWaG
Emsisoft Gen:Heur.PonyStealer.jmKfoCIaZWaG (B)
F-Secure Trojan.TR/Dropper.VB.Gen
DrWeb Trojan.PWS.Stealer.1932
VIPRE Packer.NSAnti.Gen (v)
Invincea ML/PE-A
McAfee-GW-Edition BehavesLike.Win32.Trojan.cc
Jiangmin Trojan.VBKryjetor.zil
Avira TR/Dropper.VB.Gen
MAX malware (ai score=83)
Antiy-AVL HackTool[VirTool]/Win32.VBInject
Microsoft VirTool:Win32/VBInject.OR!bit
Gridinsoft Trojan.Heur!.032120E1
Arcabit Trojan.PonyStealer.jmKfoCIaZWaG
ZoneAlarm Trojan.Win32.VBKryjetor.bmvi
GData Gen:Heur.PonyStealer.jmKfoCIaZWaG
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.VBInject.R355373
McAfee GenericRXAA-AA!D12142C55CBA
VBA32 BScope.TrojanPSW.Stealer
Malwarebytes Trojan.MalPack.VB
ESET-NOD32 a variant of Win32/Injector.DPSH
TrendMicro-HouseCall TSPY_HPFAREIT.SM4
Yandex Trojan.GenAsa!6a8OXH777Ek
SentinelOne Static AI – Suspicious PE
Fortinet W32/GenKryptik.ANKZ!tr
BitDefenderTheta Gen:NN.ZevbaF.34634.jmKfaCIaZWaG
AVG FileRepMalware
CrowdStrike win/malicious_confidence_60% (D)
Qihoo-360 HEUR/QVM19.1.455B.Malware.Gen

How to remove Heur.PonyStealer.jmKfoCIaZWaG?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 months ago