Contact Us

If already executed, use Microsoft Defender Antivirus or a reputable third-party scanner to perform a full system scan and remove remnant artifacts.

Often identified as HackTool:Win32/NLBrute , Trojan.Generic , or Trojan.CoinMiner . Malicious Behavior & Capabilities

It is used by cybercriminals to obtain unauthorized access to thousands of computers worldwide by decrypting login credentials.

It checks for the presence of debuggers to avoid being analyzed by security researchers.

Analysis reports from Hybrid Analysis and ANY.RUN highlight several dangerous activities:

Back to top WhatsApp icon