Threat Database Trojans Trojan.MSIL.Krypt.ACI

Trojan.MSIL.Krypt.ACI

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 13,098
Threat Level: 80 % (High)
Infected Computers: 1,104
First Seen: June 18, 2021
Last Seen: April 8, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Krypt.ACI
Signature status: No Signature

Known Samples

MD5: c73547e17e95e0f81ed76a9560263be3
SHA1: 9a6a3e5e81775c9c191561d1258c128b4c1bd4b5
SHA256: 52CF09D273EB83D5E6F72770CE4216E189B7E1530FC340ECEE69BC0748AFEC8F
File Size: 34.82 KB, 34816 bytes
MD5: 29ffb0bd9c014259df8a8802da99f71a
SHA1: 92de1dfda89ce9c9d602c3caa0efb5f56a9f28fb
SHA256: 828DC439405E57FE8778C008AB51077096B1B2A3153C3624851D77E9E8C130B0
File Size: 57.34 KB, 57344 bytes
MD5: 7a081cbb8542646a1080080927960cbd
SHA1: 84efafcdf27ac3c73cbe352c8b614805025afd79
SHA256: 70A2B42A98B89DB689158D860EF2B79CA235A51E50E4C5D908022F20F34ACD17
File Size: 53.02 KB, 53024 bytes
MD5: e13f3771495129e4b68254aeefca06f7
SHA1: c2605057598b3b3aa1dcef46503d651cb4ab8d9a
SHA256: A36A92639795BD6CC31F3D2DF5D0545ABCE7203B917814A3BF32781A24DA8568
File Size: 34.72 KB, 34720 bytes
MD5: bd9898c3a8e6ab82a183e47feeaf6d32
SHA1: 50b4ebc02512f4df22ca5649592c68dd193e8b30
SHA256: 010EF09EA289EFB95BDB84E0500CA8A7A4E4C5F65B9C01E30742F0E8842665EC
File Size: 35.84 KB, 35840 bytes
Show More
MD5: ee3f854cf916b216cb08ccbbb60bc2d7
SHA1: b1297f7a92bb126b6a7a2313696043aa15241a78
SHA256: DC45BAD5067EA9E0E7069F9F7FFCE3EA50AAA6345817FFE5650B5F4C3A5075A0
File Size: 45.06 KB, 45056 bytes
MD5: 151e207496a565a739aca75bc9b83381
SHA1: 248a331462112adefdf2638277b97af240be58aa
SHA256: FF45F51BCDD8FE7B3C803A9C8FF11E96FB7649DFB81A4F1972256309E9DEBE88
File Size: 36.35 KB, 36352 bytes
MD5: 9799b6f1be76df4405511438366ff782
SHA1: 4f4c1254241ff57c412e0580ecf9f2afb1f56b66
SHA256: FB8DC374604005E3D1C9B3E2CBBF8ACE5AF5284F19D720C49C948A1686BAAA6A
File Size: 34.30 KB, 34304 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 1.1.0.0
  • 1.0.0.0
  • 0.3.1.0
  • 0.0.0.1
  • 0.0.0.0
Comments Restart AIM
Company Name Autodesk, Inc.
File Description
  • Automatizovaný opravár chýb 1001 pri prihlasovaní do MS-365 aplikácií
  • Collect asset info and append to local file
  • Restart AIM
  • Revit 2026 Dictionary Permissions
  • Steam Tools Installer
File Version
  • 1.1
  • 1.0.0.0
  • 0.3.1
  • 0.0.0.1
  • 0.0.0.0
Internal Name
  • AssetLOG.exe
  • ConsultaAjustaSSD.exe
  • ExplorerEspecial.exe
  • Informe_sistema.exe
  • MS-365-chyba-prihlasovania-1001.exe
  • Restart-AIM.exe
  • Revit_DictionaryPermissions.exe
  • SteamTools Installer.exe
Legal Copyright
  • Copyright 2025 Autodesk, Inc.
  • © 2025 ~ Patrik Dianiška
Original Filename
  • AssetLOG.exe
  • ConsultaAjustaSSD.exe
  • ExplorerEspecial.exe
  • Informe_sistema.exe
  • MS-365-chyba-prihlasovania-1001.exe
  • Restart-AIM.exe
  • Revit_DictionaryPermissions.exe
  • SteamTools Installer.exe
Product Name
  • AssetLog
  • ConsultaAjustaSSD
  • MS-365 [error 1001] repair
  • Revit-Dictionary-Permissions.exe
Product Version
  • 1.1
  • 1.0.0.0
  • 0.3.1
  • 0.0.0.1
  • 0.0.0.0

Digital Signatures

Signer Root Status
Autodesk, Inc. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed
NextGen Updater NextGen Updater Self Signed

File Traits

  • .NET
  • HighEntropy
  • Installer Version
  • x64
  • x86

Block Information

Total Blocks: 49
Potentially Malicious Blocks: 0
Whitelisted Blocks: 49
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Agent.FSDA
  • MSIL.Agent.JJ
  • MSIL.FakeMS.HF
  • MSIL.FakeMS.HG
  • MSIL.FakeMS.HK
Show More
  • MSIL.FakeMS.LA
  • MSIL.FakeMS.QA
  • MSIL.FakeMS.QF
  • MSIL.FakeMS.QH
  • MSIL.FakeMS.QL
  • MSIL.FakeMS.QN
  • MSIL.FakeMS.QS
  • MSIL.FakeMS.RC
  • MSIL.FakeMS.SA
  • MSIL.FakeMS.TQ

Files Modified

File Attributes
\device\namedpipe\dav rpc service Generic Read,Write Data,Write Attributes,Write extended,Append data
\device\namedpipe\pshost.133997503385282900.5504.defaultappdomain.9a6a3e5e81775c9c191561d1258c128b4c1bd4b5_0000034816 Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\pshost.134037487461445302.1268.defaultappdomain.84efafcdf27ac3c73cbe352c8b614805025afd79_0000053024 Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\pshost.134094630478415097.6968.defaultappdomain.c2605057598b3b3aa1dcef46503d651cb4ab8d9a_0000034720 Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\pshost.134171622977415626.220.defaultappdomain.50b4ebc02512f4df22ca5649592c68dd193e8b30_0000035840 Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\pshost.134172047150811522.6032.defaultappdomain.b1297f7a92bb126b6a7a2313696043aa15241a78_0000045056 Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288
\device\namedpipe\wkssvc Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\__psscriptpolicytest_0xbl3hzy.w0c.ps1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_11a1ckis.4bg.psm1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_3tdyohvq.4yq.ps1 Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\__psscriptpolicytest_4qg5rqat.jnz.ps1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_ak1hrez0.smk.psm1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_c2kmpadb.mhd.psm1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_e0cy1wtq.owq.psm1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_gbru2rqh.s15.ps1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_gzma3yay.cvm.ps1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\__psscriptpolicytest_n1chhwno.enq.psm1 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.0.cs Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.cmdline Generic Write,Read Attributes
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.err Generic Write,Read Attributes
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.out Generic Write,Read Attributes
c:\users\user\appdata\local\temp\jhdmmogw\jhdmmogw.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtCancelTimer2
  • ntdll.dll!NtCancelWaitCompletionPacket
  • ntdll.dll!NtClearEvent
Show More
  • ntdll.dll!NtClose
  • ntdll.dll!NtCompareSigningLevels
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtCreateTimer
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDelayExecution
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFlushProcessWriteBuffers
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtFsControlFile
  • ntdll.dll!NtGetCachedSigningLevel
  • ntdll.dll!NtGetWriteWatch
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenSymbolicLinkObject
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySymbolicLinkObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtQueueApcThreadEx2
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRemoveIoCompletion
  • ntdll.dll!NtResetWriteWatch
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSetTimerEx
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtTraceEvent
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtUnsubscribeWnfStateChange
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects

7 additional items are not displayed above.

User Data Access
  • GetComputerName
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserNameEx
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Other Suspicious
  • AdjustTokenPrivileges
Network Winsock2
  • WSAStartup
Network Info Queried
  • GetAddrInfo
Service Control
  • OpenSCManager
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Tscsowro\AppData\Local\Temp\jhdmmogw\jhdmmogw.cmdline"

Trending

Most Viewed

Loading...