Malware

Malware.AI.3762969166 removal guide

Malware Removal

The Malware.AI.3762969166 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.3762969166 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Likely virus infection of existing system binary

How to determine Malware.AI.3762969166?


File Info:

name: 9685F32FF6B76EE15E6C.mlw
path: /opt/CAPEv2/storage/binaries/a63c8f3186c826620eadb28c3380ac9f9c2096e35c164dd503ee7c42c6a1a001
crc32: 1222E3F1
md5: 9685f32ff6b76ee15e6c64c4eca5abba
sha1: 4360fe8e1924310b9cb1b802138f6a1a2876bab4
sha256: a63c8f3186c826620eadb28c3380ac9f9c2096e35c164dd503ee7c42c6a1a001
sha512: 7e07bc25decfb7d5547f9f834edaaa4e97466739f767c079e09103b1f3c07ecf1b1941d1bd79c878033a2094883661f0b931ffdc301a46b2327c3256608d3bdb
ssdeep: 49152:jBtaL4oZmorlQb1ajkEdyckj2dfIuL4/1UQmh01:E4pq+sjtyBj2dAY4/1dmh0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13DB5CF11A36CA775E4A241728E6A4EF43D297EF1BB31DD9763283D0D26B1680B43E353
sha3_384: 20f24d4f2e6c89d2f6ed7159087bb4ebd77cfdaccd4bc7febe56ee085adf07477233cf75cbc335aff1f01fedf7d9bda8
ep_bytes: 558bec6aff682862570068d048570064
timestamp: 2021-10-28 02:32:59

Version Info:

Comments: Provides privileged (elevated) functions for ThumbsPlus
CompanyName: Cerious Software Inc.
FileDescription: ThumbsPlus priveleged utility
FileVersion: 10.1.0.4005
InternalName: ThumbsPriv
LegalCopyright: Copyright (C) 2007-2016 Cerious Software Inc.
OriginalFilename: ThumbsPriv.exe
ProductName: ThumbsPlus
ProductVersion: 10.1.0.4005
Translation: 0x0409 0x04b0

Malware.AI.3762969166 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.405256
FireEyeGeneric.mg.9685f32ff6b76ee1
ALYacGen:Variant.Zusy.405256
MalwarebytesMalware.AI.3762969166
K7AntiVirusTrojan ( 005825821 )
K7GWTrojan ( 005825821 )
BitDefenderThetaGen:NN.ZexaF.34084.mE0@aOqw3puO
CyrenW32/Kryptik.FQL.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLMN
KasperskyHEUR:Trojan.Win32.Injuke.gen
BitDefenderGen:Variant.Zusy.405256
Ad-AwareGen:Variant.Zusy.405256
EmsisoftGen:Variant.Zusy.405256 (B)
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1142521
MAXmalware (ai score=89)
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataWin32.Trojan.PSE.1QRPSAL
CynetMalicious (score: 100)
AhnLab-V3Adware/Win.Generic.R425898
APEXMalicious
RisingMalware.Heuristic!ET#89% (RDMK:cmRtazojiiA/DEfLx9Cz2056/l7S)
FortinetW32/Kryptik.HATU!tr
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Malware.AI.3762969166?

Malware.AI.3762969166 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment