Trojan

Trojan:Win32/Dacic.A!rfn removal guide

Malware Removal

The Trojan:Win32/Dacic.A!rfn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Dacic.A!rfn virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Network activity detected but not expressed in API logs

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan:Win32/Dacic.A!rfn?


File Info:

crc32: 54FABCF8
md5: 127786b083a8fa72666da7367ac50f50
name: 127786B083A8FA72666DA7367AC50F50.mlw
sha1: e09c4926c93c57ef4f57f354df3ed3006e02c8b9
sha256: 5ed98c01804bf5a9b603936d143e4d0372d59e048f35b046897dc912c9d52012
sha512: bdbbb48871c2ad1d47800446a842b0b023f442b199f7d3ddae0d5b91f8a1ab1c9f421fb8dff6c87f3906cf3986ff2657686c80c95be6e3b997aad3dd8974e170
ssdeep: 12288:EiuDwZBbY3GLryDEl2odHjmCEAEi6/7oq9IvId3:dFryYlzdDxsn
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright 2015
Assembly Version: 1.0.0.0
InternalName: Computerized_grading _system.exe
FileVersion: 1.0.0.0
CompanyName:
LegalTrademarks:
Comments:
ProductName:
ProductVersion: 1.0.0.0
FileDescription:
OriginalFilename: Computerized_grading _system.exe

Trojan:Win32/Dacic.A!rfn also known as:

K7AntiVirusTrojan ( 700000121 )
LionicTrojan.MSIL.Kryptik.4!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Spy.19531
CynetMalicious (score: 99)
ALYacDeepScan:Generic.MSIL.Injector.1.90F7417E
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.794666
SangforSuspicious.Win32.Save.a
AlibabaTrojan:MSIL/Kryptik.a0a05643
K7GWTrojan ( 700000121 )
Cybereasonmalicious.083a8f
CyrenW32/MSIL_Kryptik.CYQ.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Kryptik.DEA
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderDeepScan:Generic.MSIL.Injector.1.90F7417E
NANO-AntivirusTrojan.Win32.Agent.dztrdg
MicroWorld-eScanDeepScan:Generic.MSIL.Injector.1.90F7417E
TencentWin32.Trojan.Inject.Auto
Ad-AwareDeepScan:Generic.MSIL.Injector.1.90F7417E
ComodoMalware@#p3hl17m8s93o
BitDefenderThetaGen:NN.ZemsilF.34236.Nm0@am!9sah
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Fareit.jc
FireEyeGeneric.mg.127786b083a8fa72
EmsisoftDeepScan:Generic.MSIL.Injector.1.90F7417E (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/MSIL.gfiv
AviraHEUR/AGEN.1127722
eGambitGeneric.Malware
Antiy-AVLTrojan/Generic.ASMalwS.14163CE
KingsoftWin32.Troj.Kryptik.V.(kcloud)
MicrosoftTrojan:Win32/Dacic.A!rfn
GDataDeepScan:Generic.MSIL.Injector.1.90F7417E
AhnLab-V3Trojan/Win32.Skeeyah.R162664
McAfeeTrojan-FGYT!127786B083A8
MAXmalware (ai score=99)
PandaTrj/CI.A
YandexTrojan.Kryptik!8kTmvw1pQ8A
IkarusTrojan.MSIL.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Kryptik.DEA!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Trojan:Win32/Dacic.A!rfn?

Trojan:Win32/Dacic.A!rfn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment