Malware

Heur.BZC.PZQ.Boxter.762.2DE8324C removal instruction

Malware Removal

The Heur.BZC.PZQ.Boxter.762.2DE8324C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware - Review 2020

GridinSoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend to use GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the TRIAL period.
6-day free trial available.

What Heur.BZC.PZQ.Boxter.762.2DE8324C virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Collects and encrypts information about the computer likely to send to C2 server
  • A script or command line contains a long continuous string indicative of obfuscation
  • Attempts to execute suspicious powershell command arguments

How to determine Heur.BZC.PZQ.Boxter.762.2DE8324C?


File Info:

name: FBFB8DB1A5AC1B0B5F86.mlw
path: /opt/CAPEv2/storage/binaries/bd9066e053124f3df10cb64c85aa7e76db9d11b5764159f1652879504ecb8391
crc32: 25475BA0
md5: fbfb8db1a5ac1b0b5f869e9fb6bace8d
sha1: c09444fbc8aa1e2e249ccae9c739a0d893a658f1
sha256: bd9066e053124f3df10cb64c85aa7e76db9d11b5764159f1652879504ecb8391
sha512: 96ca2b6f31712ee5d2767d15bc16cb46b8da872f16d4a5b0e34f057b9cd3edb6632435d58711b20752f2513d47214aa32de91a2ad6bc895bc6eee0926a95e852
ssdeep: 3072:9uo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfZ0:95oaqJhJMHW69B9VjMdxPedN9ug0/9T8
type: PE32+ executable (console) x86-64, for MS Windows
tlsh: T1B7C33967B2E01188DBB581FAD9921746E77074761B14A3DB2B7853B71B2B4CA8F3C390
sha3_384: 15f325f71cdad4d89807274372fc25b4a3800c908e82c49f63e33990b698037d97d733949a96ed4f40d6772946d48923
ep_bytes: 4883ec2849c7c0600100004831d248b9
timestamp: 2018-02-01 19:43:01

Version Info:

0: [No Data]

Heur.BZC.PZQ.Boxter.762.2DE8324C also known as:

Elasticmalicious (high confidence)
ALYacHeur.BZC.PZQ.Boxter.762.2DE8324C
CyrenW64/Boxter.A.gen!Eldorado
ESET-NOD32PowerShell/Kryptik.H
APEXMalicious
CynetMalicious (score: 99)
KasperskyHEUR:Backdoor.PowerShell.Agent.gen
BitDefenderHeur.BZC.PZQ.Boxter.762.2DE8324C
MicroWorld-eScanHeur.BZC.PZQ.Boxter.762.2DE8324C
Ad-AwareHeur.BZC.PZQ.Boxter.762.2DE8324C
SophosGeneric ML PUA (PUA)
ZillyaTrojan.Diztakun.Win32.3913
McAfee-GW-EditionBehavesLike.Win64.Dropper.ch
FireEyeGeneric.mg.fbfb8db1a5ac1b0b
EmsisoftHeur.BZC.PZQ.Boxter.762.2DE8324C (B)
SentinelOneStatic AI – Malicious PE
GDataHeur.BZC.PZQ.Boxter.762.2DE8324C
AviraTR/B2E.Dropper.Gen
MAXmalware (ai score=88)
ArcabitHeur.BZC.PZQ.Boxter.762.2DE8324C
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3Trojan/Win.Generic.R439997
TACHYONRansom/W64.Encoder.125440
IkarusTrojan.PowerShell.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW64/Agent.C317!tr
Cybereasonmalicious.1a5ac1

How to remove Heur.BZC.PZQ.Boxter.762.2DE8324C?

Heur.BZC.PZQ.Boxter.762.2DE8324C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment