Malware

About “Jaik.96343” infection

Malware Removal

The Jaik.96343 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Jaik.96343 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Georgian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine Jaik.96343?


File Info:

name: BF11DF052F5A8608AF01.mlw
path: /opt/CAPEv2/storage/binaries/a14c9b81e7d4f5a18fa685772326d9e624f74d0b82f164b9226a7cf5d517e97c
crc32: BB20E3DE
md5: bf11df052f5a8608af01266c79a16592
sha1: 2c54513b713fc8097616bebe843dcc7ee12c7279
sha256: a14c9b81e7d4f5a18fa685772326d9e624f74d0b82f164b9226a7cf5d517e97c
sha512: 6c9b8138d1c11806963303086665a475163e0324391e1b696e2abef2ec4f49621f44d41af2c6e8af4aa3b7b2941396bae69b56c22c5b725af8c1710e900296d9
ssdeep: 12288:x0xAUrgSbRhuf7KB2bwa37SUDof3eMfVb:x0xAC3cM2bt37Soo3eMdb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15794F1027792D871D5922D3064A4DBB17B7FB9325D70994BF360A72E1EB338096B234B
sha3_384: c4df2f3ad09b7ca066abbd8143de623895e1a64d7b01212e6c1ae4633f396386ed54f73047eab8eb3decb43bbe7707b9
ep_bytes: e8e9780000e979feffff558bec83ec04
timestamp: 2021-07-25 13:56:25

Version Info:

FileVersions: 9.1.9.8
InternationalName: povgwaoci.iwe
Copyright: Copyright (C) 2022, somoklos
ProjectVersion: 74.35.26.57

Jaik.96343 also known as:

BkavW32.AIDetect.malware2
MicroWorld-eScanGen:Variant.Jaik.96343
ClamAVWin.Malware.Azorult-9949206-0
FireEyeGeneric.mg.bf11df052f5a8608
McAfeeArtemis!BF11DF052F5A
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005986631 )
AlibabaRansom:Win32/StopCrypt.1f75a5ce
CyrenW32/Ransom.QS.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HQVK
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-Spy.Win32.Stealer.gen
BitDefenderGen:Variant.Jaik.96343
NANO-AntivirusTrojan.Win32.Stealer.jsmvzz
AvastWin32:DropperX-gen [Drp]
TencentWin32.Trojan.FalseSign.Dflw
Ad-AwareGen:Variant.Jaik.96343
SophosML/PE-A + Troj/Krypt-PX
DrWebTrojan.PWS.StealerNET.125
VIPREGen:Variant.Jaik.96343
McAfee-GW-EditionArtemis!Trojan
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Jaik.96343 (B)
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.PSE.1UOOY0Y
AviraTR/YAV.Minerva.rbxam
Antiy-AVLTrojan/Generic.ASMalwS.5E49
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.gen
MicrosoftRansom:Win32/StopCrypt.RPL!MTB
GoogleDetected
AhnLab-V3Downloader/Win.BeamWinHTTP.R520587
ALYacGen:Variant.Jaik.96343
MAXmalware (ai score=88)
VBA32TrojanRansom.Stop
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_GEN.R002H0CIK22
RisingMalware.Obscure!1.A89F (CLASSIC)
IkarusTrojan.Win32.Crypt
FortinetW32/PossibleThreat
AVGWin32:DropperX-gen [Drp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Jaik.96343?

Jaik.96343 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment