Malware

Malware.AI.4020182459 removal guide

Malware Removal

The Malware.AI.4020182459 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.4020182459 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Uses suspicious command line tools or Windows utilities

How to determine Malware.AI.4020182459?


File Info:

name: 4E41CFF173B859F7293F.mlw
path: /opt/CAPEv2/storage/binaries/55b8295244999e1a4bd5a968180f3c051cefe21da23ec0ae8c2d81f959bcf1fa
crc32: 5D3C9322
md5: 4e41cff173b859f7293f39bfc95f6daa
sha1: d1fcd3cb2f89f70f7e55a9c810e8742204fb2ef6
sha256: 55b8295244999e1a4bd5a968180f3c051cefe21da23ec0ae8c2d81f959bcf1fa
sha512: 398d0e02845865e7dc4c98e83365d296a1990b91ca4a97684b9371eac5f4eb1591cc2c4e605f6a405d68d3a9a0648983c47374924c0741ec6af3f872f2cae670
ssdeep: 49152:MVcQiB7RBjNahHlxcgEFJBKIaPw8jsKQCnAb:MVfiBV+hHiJByPzjsK9nAb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C18533AB3CB62379F7361AB72D4860772B7DFA147425D289643E8D8C8D3310965B920F
sha3_384: 86f1ccecc266514c5f4e1c5eaca06fe23636ed46ee4a276aad146f2242e25665ae3c06562006b72ec6dbcc5b81c694be
ep_bytes: 558bec83c4b853565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Malware.AI.4020182459 also known as:

LionicAdware.Win32.Ucmore.2!c
MicroWorld-eScanGen:Adware.Heur.bu8@R0wvXIfi
FireEyeGen:Adware.Heur.bu8@R0wvXIfi
McAfeeArtemis!4E41CFF173B8
CylanceUnsafe
VIPREUCmore.XP.SearchAccelerator
SangforPUP.Win32.UCmore.ed
AlibabaAdWare:Win32/Ucmore.ac7e956e
CyrenW32/Adware.OEQG-6063
SymantecPUA.Gen.2
ESET-NOD32multiple detections
ClamAVWin.Adware.UCMore-4
Kasperskynot-a-virus:AdWare.Win32.Ucmore
BitDefenderGen:Adware.Heur.bu8@R0wvXIfi
NANO-AntivirusRiskware.Win32.Ucmore.baoir
AvastWin32:Adware-gen [Adw]
TencentWin32.Adware.Ucmore.Pept
EmsisoftGen:Adware.Heur.bu8@R0wvXIfi (B)
ComodoMalware@#1syseoogzx29s
F-SecureAdware.ADSPY/BAR.Ucmore
DrWebAdware.Ucmore
McAfee-GW-EditionArtemis
SophosGeneric PUA NB (PUA)
GDataGen:Adware.Heur.bu8@RW5oZRbi
JiangminAdWare.Ucmore.g
WebrootW32.Suspicious.Heur
AviraADSPY/BAR.Ucmore
MAXmalware (ai score=100)
KingsoftWin32.Troj.Generic.(kcloud)
ViRobotAdware.Ucmore.1817831
MicrosoftTrojan:Win32/Occamy.C55
CynetMalicious (score: 99)
ALYacGen:Adware.Heur.bu8@RW5oZRbi
VBA32AdWare.Ucmore
MalwarebytesMalware.AI.4020182459
TrendMicro-HouseCallTROJ_GEN.R002H0CK421
FortinetAdware/Ucmore
AVGWin32:Adware-gen [Adw]

How to remove Malware.AI.4020182459?

Malware.AI.4020182459 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment