Malware

Malware.AI.4140446787 removal guide

Malware Removal

The Malware.AI.4140446787 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.4140446787 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Malware.AI.4140446787?


File Info:

name: B6B8E12646D8F9017D2E.mlw
path: /opt/CAPEv2/storage/binaries/b8945a6e4976c6a9b52688c68c25518d586e93d4c6b858221627ac265f25b637
crc32: 45FCABAF
md5: b6b8e12646d8f9017d2e5fc3add01840
sha1: b33ce4fc2891b3e2c01f7cc9320d14f8e14d3cf7
sha256: b8945a6e4976c6a9b52688c68c25518d586e93d4c6b858221627ac265f25b637
sha512: 062e4d73c26be52678c9096d454c4b418c6cd05d671037f036fc8f4c7c20d8ec00c59ec4cf78255e3756c24061bc208be117507bf52e5795f236f8fde9f1ac38
ssdeep: 12288:OFfNpcc/LzWTRW8fdekF19dt6daAc0Zd7:KfvcSLKTRW8fdeuttGp7
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1F4D4DF11E786C277EC6602324D95632EC0FDB4616F3587E3E3DE2B5EAEA00C19835B95
sha3_384: 2b982dccf898bbbd8f56d719fff47796c4ba3e50231c249ab3077d262b2728ca9b9fb1ed1a6c49942b967bb2294c4123
ep_bytes: e89e720000e991feffffccff25f0a343
timestamp: 2016-10-28 13:29:19

Version Info:

CompanyName: Adobe Systems Incorporated
FileDescription: LogTransport Application
FileVersion: 7.1.1.3403
InternalName: LogTransport2
LegalCopyright: Copyright 2008-15 Adobe Systems Incorporated. All rights reserved.
OriginalFilename: LogTransport2.exe
PrivateBuild: 7.1.1.3403
ProductName: LogTransport Application
ProductVersion: 7.1.1.3403
Translation: 0x0409 0x04b0

Malware.AI.4140446787 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
DrWebWin32.Beetle.2
MicroWorld-eScanGen:Variant.Zusy.486769
FireEyeGen:Variant.Zusy.486769
SkyhighBehavesLike.Win32.Generic.hc
ALYacGen:Variant.Zusy.486769
MalwarebytesMalware.AI.4140446787
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005ab4bf1 )
K7GWTrojan ( 005ab4bf1 )
CrowdStrikewin/malicious_confidence_90% (D)
BitDefenderThetaGen:NN.ZexaF.36738.Ku0@aKXIvBbi
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Patched.NKM
APEXMalicious
KasperskyHEUR:Trojan-Ransom.Win32.Gen.pef
BitDefenderGen:Variant.Zusy.486769
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Patched-AWW [Trj]
RisingTrojan.Generic@AI.100 (RDML:uHNjBVj02a+AVALv313huA)
EmsisoftGen:Variant.Zusy.486769 (B)
VIPREGen:Variant.Zusy.486769
Trapminemalicious.high.ml.score
GDataWin32.Trojan.PSE.12AP69G
GoogleDetected
MAXmalware (ai score=81)
Antiy-AVLTrojan/Win32.Patched
ArcabitTrojan.Zusy.D76D71
ZoneAlarmHEUR:Trojan-Ransom.Win32.Gen.pef
MicrosoftTrojan:Win32/Convagent.AJ!MTB
VaristW32/S-8f542844!Eldorado
AhnLab-V3Malware/Win.Generic.R603661
VBA32BScope.Trojan.Meterpreter
Cylanceunsafe
PandaTrj/Genetic.gen
TencentMalware.Win32.Gencirc.10bf1fad
IkarusTrojan.Win32.Patched
FortinetW32/Patched.IP!tr
AVGWin32:Patched-AWW [Trj]
DeepInstinctMALICIOUS

How to remove Malware.AI.4140446787?

Malware.AI.4140446787 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment