Malware

Malware.AI.2662920449 removal

Malware Removal

The Malware.AI.2662920449 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.2662920449 virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Executed a process and injected code into it, probably while unpacking
  • Sniffs keystrokes
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Network activity contains more than one unique useragent.
  • Attempts to modify proxy settings
  • Harvests information related to installed mail clients

Related domains:

www.thepaymentcentre.com
thinstall.abetterinternet.com

How to determine Malware.AI.2662920449?


File Info:

crc32: 31EA0741
md5: 7fb37e03fd4e48bf04141ddc630a1716
name: 7FB37E03FD4E48BF04141DDC630A1716.mlw
sha1: 118c32071db868d3f08489f2d44c418514de8df7
sha256: f660542973df8498463ff25caea3a74ee621a3777302cb36a43e349d53bb413a
sha512: 966385edc5ac47df3eeeba7eaf53883bd129a9c427c7032f574d69b9ed85a3e94f196f2b82012d5d80cb8070ba16f3de66cbc302d1d9eb9f2a18a3c1395feea5
ssdeep: 6144:kOyrMCIzrSOTs4TtVwPxUiD3ZuQGUkjCZdx1uH:FnvzrNtIx7NjGyZd
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Malware.AI.2662920449 also known as:

LionicRiskware.Win32.Generic.1!c
Elasticmalicious (high confidence)
DrWebDialer.Holisty
ClamAVWin.Trojan.Ag-1
CMCGeneric.Win32.7fb37e03fd!MD
ALYacGen:Variant.Graftor.7305
CylanceUnsafe
ZillyaDialer.Holistyc.Win32.47
SangforSuspicious.Win32.Save.a
AlibabaTrojanDropper:Win32/Holistyc.7dd3cd9c
K7GWTrojan-Downloader ( 005311d91 )
K7AntiVirusTrojan-Downloader ( 005311d91 )
CyrenW32/Risk.DREQ-6413
SymantecDialer.Generic
ESET-NOD32a variant of Win32/Dialer.ShortDial
APEXMalicious
AvastFileRepMalware
CynetMalicious (score: 100)
Kasperskynot-a-virus:Porn-Dialer.Win32.Holistyc.gen
BitDefenderGen:Variant.Graftor.7305
NANO-AntivirusTrojan.Win32.Small.dpes
MicroWorld-eScanGen:Variant.Graftor.7305
Ad-AwareGen:Variant.Graftor.7305
ComodoApplicUnwnt.Win32.PornDialer.Holistyc.A@f7zrt
BitDefenderThetaGen:NN.ZexaF.34170.mmGfaaiBRmii
VIPREDyfica.Holistyc (fs)
TrendMicroADW_ABET.CCA
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
FireEyeGen:Variant.Graftor.7305
EmsisoftGen:Variant.Graftor.7305 (B)
SentinelOneStatic AI – Malicious PE
JiangminPorn-Dialer.Holistyc.d
AviraDIAL/302185
Antiy-AVLTrojan/Generic.ASMalwS.188D503
MicrosoftTrojan:Win32/Wacatac.A!ml
GDataGen:Variant.Graftor.7305
AhnLab-V3Unwanted/Win32.Dialer.R65929
McAfeeArtemis!7FB37E03FD4E
MAXmalware (ai score=99)
VBA32PornDialer.Holistyc
MalwarebytesMalware.AI.2662920449
PandaDialer.Gen
TrendMicro-HouseCallADW_ABET.CCA
RisingTrojan.Aegrus!1.6786 (CLASSIC)
YandexTrojan.GenAsa!pLpBCAMYTGg
Ikarusnot-a-virus:Porn-Dialer.Win32.Holistyc
MaxSecureTrojan.Malware.1173093.susgen
FortinetRiskware/Holistyc
AVGFileRepMalware

How to remove Malware.AI.2662920449?

Malware.AI.2662920449 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment