Malware

Should I remove “Heur.Conjar.2”?

Malware Removal

The Heur.Conjar.2 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Heur.Conjar.2 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Unconventionial language used in binary resources: Russian
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

How to determine Heur.Conjar.2?


File Info:

crc32: 53EC97E0
md5: 016a24e872ac29b40383abf925ae1a8f
name: 016A24E872AC29B40383ABF925AE1A8F.mlw
sha1: 2bd6115d35b5d68f651520b5f8ba0aba82034e60
sha256: 8da3c36cfaa6efaae1669a1e9b08e74eb5bf7b99082240e283ef14386b885373
sha512: 34a649d2b770c8235f06992bacb23af686c0a8ba2791b06fc1bf571b403024ef826bb80ae0c8a418f24b7ffc30bbd40735b33874bc27291972ea41205b12ce7b
ssdeep: 1536:oakk4fke0MXfXRzNfiveaSYijUs5dcnOzWzGUuGoTf4IFUzO8fq2klfAlv:oaSfWUf55iYn4s5duJDoTzFUzBfklop
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2011 Heaventools Software
InternalName: Gsn.exe
FileVersion: 3.0.79.4
CompanyName: BitDefender
ProductName: Gusno
ProductVersion: 3.0.79.4
FileDescription: Gan
OriginalFilename: Gusn.exe
Translation: 0x004b 0x04b0

Heur.Conjar.2 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 00274f891 )
DrWebTrojan.Winlock.3260
CynetMalicious (score: 100)
ALYacGen:Heur.Conjar.2
CylanceUnsafe
ZillyaTrojan.Chameleon.Win32.96
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaTrojan:Win32/LockScreen.eb8a5c47
K7GWTrojan ( 00274f891 )
Cybereasonmalicious.872ac2
CyrenW32/Ransom.O.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/LockScreen.AFR
APEXMalicious
TotalDefenseWin32/Ransom.BQJ
AvastWin32:Trojan-gen
ClamAVWin.Trojan.234202-1
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Heur.Conjar.2
NANO-AntivirusTrojan.Win32.Winlock.dsppzh
ViRobotTrojan.Win32.A.Foreign.104448.A
MicroWorld-eScanGen:Heur.Conjar.2
TencentWin32.Trojan.Lockscreen.Cri
Ad-AwareGen:Heur.Conjar.2
SophosML/PE-A + Mal/FakeAV-NI
ComodoMalware@#khijdyyhl6fe
BitDefenderThetaGen:NN.ZexaF.34608.gu0@aGTrTefc
VIPRETrojan.Win32.Generic.pak!cobra
TrendMicroTROJ_KRYPTK.SM21
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.016a24e872ac29b4
EmsisoftGen:Heur.Conjar.2 (B)
SentinelOneStatic AI – Malicious PE
WebrootW32.Trojan.Gen
AviraTR/Crypt.XPACK.Gen
MicrosoftTrojan:Win32/Vigorf.A
AegisLabTrojan.Win32.Foreign.j!c
GDataGen:Heur.Conjar.2
AhnLab-V3Trojan/Win32.FakeAV.R11836
Acronissuspicious
McAfeeArtemis!016A24E872AC
MAXmalware (ai score=100)
MalwarebytesSpyware.PasswordStealer.XGen
PandaGeneric Malware
TrendMicro-HouseCallTROJ_KRYPTK.SM21
RisingTrojan.LockScreen!8.1AF (CLOUD)
YandexTrojan.Chameleon!ZKhSpRhEVxE
IkarusTrojan-Ransom.Foreign
MaxSecureTrojan.Malware.3562291.susgen
FortinetW32/FakeAV.LX!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Generic.HwgA0GsA

How to remove Heur.Conjar.2?

Heur.Conjar.2 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment