Malware

About “Malware.Heuristic.2046” infection

Malware Removal

The Malware.Heuristic.2046 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.Heuristic.2046 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Malware.Heuristic.2046?


File Info:

name: 14B512121EC130171490.mlw
path: /opt/CAPEv2/storage/binaries/4cdf785c3ab4466a42f5e0d6405e081b558fff612d1bbac53b7cbda7844bcf3d
crc32: 4C954899
md5: 14b512121ec130171490dbb4de3672d1
sha1: eae3d00137a09aa9a823d2f98f6aea52284751cc
sha256: 4cdf785c3ab4466a42f5e0d6405e081b558fff612d1bbac53b7cbda7844bcf3d
sha512: 674d0b9e27fa11f2650b04f874ede50f37c11e9146273a6c70d16b7067cb1f875f7a35470fe5d2621e815d2eaa60ec87294282b08fa5baa21c1f3dc136c5b79d
ssdeep: 12288:xCG8ghTaFbYn6QOQ7zeOXO+y0o131AlPYDhjlAoz4m1wq:xQeTCYn6QXzeO++ylJ1GY3zWq
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E4A40200B581C273D0BB113549E6CA3A9B297831076ED5D7BBD91B766E123D0EA393CE
sha3_384: 9dfad976fb447e6b363a0a815bacc192d73842f73eb5976a446b7a10b55f5b4c2179938c3940d7c770d548755109a224
ep_bytes: e8dd5b0000e9a4feffff6a0c68c81342
timestamp: 2009-09-20 11:43:57

Version Info:

Translation: 0x0000 0x04b0
Comments: q群184601801,184602160,79101251,18573707
CompanyName: 687130@qq.com
FileDescription: 写着玩的
FileVersion: 1.0.4336.33028
InternalName: 一球成名浏览器.exe
LegalCopyright: Copyright © 2011
LegalTrademarks: 687130@qq.com
OriginalFilename: 一球成名浏览器.exe
ProductName: 一球成名浏览器
ProductVersion: 1.0.4336.33028
Assembly Version: 1.0.4336.33028

Malware.Heuristic.2046 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Cerbu.192764
FireEyeGen:Variant.Cerbu.192764
SkyhighBehavesLike.Win32.Injector.gc
ALYacGen:Variant.Cerbu.192764
MalwarebytesMalware.Heuristic.2046
VIPREGen:Variant.Cerbu.192764
BitDefenderGen:Variant.Cerbu.192764
CrowdStrikewin/malicious_confidence_60% (W)
VirITTrojan.Win32.Generic.MTO
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Score-6912404-0
AlibabaTrojanDropper:Win32/Mdrop.6e84b35f
ViRobotWorm.Win32.Autorun.284737
RisingTrojan.Generic@AI.100 (RDML:2FbE3ebwx/H+jj+TNdXNug)
EmsisoftGen:Variant.Cerbu.192764 (B)
TrendMicroTROJ_GEN.R002C0RJS23
Trapminemalicious.high.ml.score
SophosMal/Mdrop-BK
Kingsoftmalware.kb.a.992
MicrosoftProgram:Win32/Wacapew.C!ml
ArcabitTrojan.Cerbu.D2F0FC
GDataGen:Variant.Cerbu.192764
GoogleDetected
McAfeeArtemis!14B512121EC1
MAXmalware (ai score=85)
DeepInstinctMALICIOUS
VBA32Trojan-Inject.Memtest
Cylanceunsafe
TrendMicro-HouseCallTROJ_GEN.R002C0RJS23
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan-Downloader.Agent.EDBQ
FortinetRiskware/MemDropper
BitDefenderThetaGen:NN.ZexaF.36792.Cq0@aukRkmi
AVGWin32:Malware-gen
Cybereasonmalicious.137a09
AvastWin32:Malware-gen

How to remove Malware.Heuristic.2046?

Malware.Heuristic.2046 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment