Malware

How to remove “Exploit:Win32/Shellcode.VS!MSR”?

Malware Removal

The Exploit:Win32/Shellcode.VS!MSR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Exploit:Win32/Shellcode.VS!MSR virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Exploit:Win32/Shellcode.VS!MSR?


File Info:

name: A1674824FCE7442C468E.mlw
path: /opt/CAPEv2/storage/binaries/2eb9fe6daa2b6dcdafb0907d64afa2233e21af8f67146526097786c3925bd703
crc32: 69D531C4
md5: a1674824fce7442c468e75f21a71236d
sha1: 798db0edba8fa80150cd11be881c9063b573e154
sha256: 2eb9fe6daa2b6dcdafb0907d64afa2233e21af8f67146526097786c3925bd703
sha512: 03da1675fdf62a3abc240cdb6be6a90e55a711863b9b38990ad63bfa68245fd2352375ccf42ba5d216c7f18702b01cc2d4a6356811ef1c49e970e9a465e47217
ssdeep: 196608:kuBJElNWmQdQk+0tRBEtTuvgjgrsagUF5tQgL/Kj7:k4JE2R+WeToprsDUFH/Kj7
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10A66222F50B4131CE0E2807B5B30ACE793E4CC6541AD3212DFCA7A6BD5FD5A39A462B5
sha3_384: 15bb9e0d7462586234b2c66a94b1c0fe4ed2ec593601c00e2677e93ba122c0f75b5b7fee3dc60bbe22c510636be5624f
ep_bytes: 60be00d099008dbe0040a6ff5783cdff
timestamp: 2016-05-19 07:08:12

Version Info:

CompanyName: Thycotic Software, LLC
FileDescription: Thycotic Agent Bundle
FileVersion: 11.2.3095
InternalName: setup
LegalCopyright: Copyright (c) Thycotic Software, LLC. All rights reserved.
OriginalFilename: ThycoticAgentsInstaller.exe
ProductName: Thycotic Agent Bundle
ProductVersion: 11.2.3095
Translation: 0x0409 0x04e4

Exploit:Win32/Shellcode.VS!MSR also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Shellcode.4!c
Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Variant.Fugrafa.263538
FireEyeGen:Variant.Fugrafa.263538
ALYacGen:Variant.Fugrafa.263538
MalwarebytesMalware.Heuristic.1003
SangforExploit.Win32.Shellcode.Vspu
K7AntiVirusTrojan ( 005975ad1 )
AlibabaExploit:Win32/Shellcode.d00646e4
K7GWTrojan ( 005975ad1 )
BitDefenderThetaGen:NN.ZexaF.36196.@pLfaKn4TAnQ
CyrenW32/ABRisk.ZRTH-8229
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.FZFJ
APEXMalicious
CynetMalicious (score: 99)
KasperskyExploit.Win32.Shellcode.anfa
BitDefenderGen:Variant.Fugrafa.263538
AvastWin32:Malware-gen
TencentMalware.Win32.Gencirc.1168e685
EmsisoftGen:Variant.Fugrafa.263538 (B)
F-SecureMalware.JS/Shellcode.hefho
DrWebTrojan.Inject4.40756
VIPREGen:Variant.Fugrafa.263538
TrendMicroTROJ_GEN.R06BC0DE123
McAfee-GW-EditionGenericRXUA-MZ!268EF703EC3A
SophosMal/Generic-S
GDataWin32.Backdoor.Remcos.TTQIJ2
JiangminExploit.ShellCode.hms
AviraJS/Shellcode.hefho
Antiy-AVLTrojan[Exploit]/Win32.ShellCode
ArcabitTrojan.Fugrafa.D40572
ZoneAlarmExploit.Win32.Shellcode.anfa
MicrosoftExploit:Win32/Shellcode.VS!MSR
GoogleDetected
AhnLab-V3Exploit/Win.Shellcode.C5227639
McAfeeArtemis!A1674824FCE7
MAXmalware (ai score=89)
Cylanceunsafe
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R06BC0DE123
RisingExploit.Shellcode!8.2A (TFE:5:QffEuzBJPOL)
FortinetW32/PossibleThreat
AVGWin32:Malware-gen
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Exploit:Win32/Shellcode.VS!MSR?

Exploit:Win32/Shellcode.VS!MSR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment