Malware

Malware.AI.3035605778 (file analysis)

Malware Removal

The Malware.AI.3035605778 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.3035605778 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Unconventionial language used in binary resources: Arabic (Egypt)
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Malware.AI.3035605778?


File Info:

crc32: DDC3DE77
md5: 114bf101f4e464c172f19de1cc09cd6a
name: 114BF101F4E464C172F19DE1CC09CD6A.mlw
sha1: ae42a3a82aeef132bfaa58e66324dfe3ee271e12
sha256: 5e435555f1cf21cd87c28351e233e648e19df9d71b77ed1032c7168a217194bf
sha512: 55e1bddd01ce65bbe1eaf24094b693754172c0ac109908bf5c71c192d26230dbba07929f5b90702e373bc0438ce2e6bb3ec1ef1287a25506b2800b4b1ea76949
ssdeep: 12288:SNjZDklPq7rh+5rYm1F1SD6J4K3+6mH2ox9LZ9PXUhsxDaXzMdjIkEPFnN6:SNFrfh+5r3f1SD6J4JDHNHzWDOkl
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 2018 Make Capacity Director
Assembly Version: 0.0.0.0
InternalName: clone1.exe
FileVersion: 18.2.5.1
CompanyName: Third Data Corp.
Comments: izewajufogafenoyog
ProductName: Make Capacity Director
ProductVersion: 18.2.5.1
FileDescription: Make Capacity Director
OriginalFilename: clone1.exe

Malware.AI.3035605778 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusRiskware ( 0040eff71 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.26535
McAfeeArtemis!114BF101F4E4
CylanceUnsafe
ZillyaTrojan.Delf.Win32.110327
SangforBackdoor.Win32.Rescoms.D
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderGen:Variant.Doina.7284
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.1f4e46
SymantecDownloader
ESET-NOD32Win32/Filecoder.GandCrab.D
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 99)
KasperskyTrojan.Win32.Delf.tfqp
AlibabaBackdoor:Win32/Rescoms.1c16f71e
NANO-AntivirusTrojan.Win32.Delf.fjlflu
MicroWorld-eScanGen:Variant.Doina.7284
TencentWin32.Trojan.Inject.Auto
Ad-AwareGen:Variant.Doina.7284
ComodoMalware@#2hihm3bumiyam
BitDefenderThetaAI:Packer.1E868F2D17
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_GANDCRAB.THJBBAH
McAfee-GW-EditionBehavesLike.Win32.Dropper.bc
FireEyeGeneric.mg.114bf101f4e464c1
EmsisoftGen:Variant.Doina.7284 (B)
JiangminTrojan.Delf.amo
WebrootW32.Trojan.GenKD
AviraHEUR/AGEN.1109897
AegisLabTrojan.Win32.Delf.4!c
GDataGen:Variant.Doina.7284
AhnLab-V3Malware/Win32.Generic.C2773634
VBA32Trojan.Delf
MalwarebytesMalware.AI.3035605778
TrendMicro-HouseCallRansom_GANDCRAB.THJBBAH
RisingTrojan.Injector!8.C4 (CLOUD)
YandexTrojan.GenAsa!ikQ6NfSRX0s
IkarusTrojan-Spy.LokiBot
MaxSecureTrojan.Malware.73844537.susgen
FortinetW32/GenKryptik.EKLE!tr
PandaTrj/GdSda.A

How to remove Malware.AI.3035605778?

Malware.AI.3035605778 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment