Malware

Malware.Heuristic.2046 removal instruction

Malware Removal

The Malware.Heuristic.2046 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.Heuristic.2046 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Performs HTTP requests potentially not found in PCAP.
  • Authenticode signature is invalid
  • CAPE detected the embedded pe malware family
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Anomalous binary characteristics
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Malware.Heuristic.2046?


File Info:

name: C78D87560C89530DF4BB.mlw
path: /opt/CAPEv2/storage/binaries/8773468d1954827df5626a47193261486fc1e41877a0074342488c004f7b2068
crc32: 7FAB0AA5
md5: c78d87560c89530df4bb8d4593d50ef6
sha1: e6f9fca3ca1afe8d8bc9e5773334def661c00d6f
sha256: 8773468d1954827df5626a47193261486fc1e41877a0074342488c004f7b2068
sha512: 304c551c35a794e74580d79eacd768adca6095306bf115f9c36f4579d2152df456799f3a2af73bd16cd5a5aa52f6258718bc9dd8bf207b46cb29495fbdd46e0d
ssdeep: 384:pyYcYDQxuAPWfFSlE3ugXfZFQ6u9q3Gnt41WKyDssu:pyHPPSQyBnXx3rWKoZ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19CD28423B509AD36E658C6B20C65C0AD3A17BDF51A914F1B2B4EAF141D3E6537AA030F
sha3_384: 7cfa44e491f0d5b94986d323a1670cc0a682c5e83e582c5d7feb609811aa8997962aad4b7cd4e3db469c730b9e2019d6
ep_bytes: 6848184000e8f0ffffff000000000000
timestamp: 2011-09-16 03:18:31

Version Info:

0: [No Data]

Malware.Heuristic.2046 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Genome.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.Mint.Hiamoe.20
FireEyeGeneric.mg.c78d87560c89530d
SkyhighBehavesLike.Win32.Generic.mz
McAfeeArtemis!C78D87560C89
MalwarebytesMalware.Heuristic.2046
VIPREGen:Heur.Mint.Hiamoe.20
SangforSuspicious.Win32.Save.vb
AlibabaTrojanClicker:Win32/Generic.a70c762a
Cybereasonmalicious.60c895
BitDefenderThetaAI:Packer.ECED5AE71E
VirITTrojan.Win32.VBCrypt.GQ
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/TrojanClicker.VB.NWD
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R03BC0GC324
AvastWin32:Evo-gen [Trj]
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Heur.Mint.Hiamoe.20
NANO-AntivirusTrojan.Win32.TrjGen.oyade
EmsisoftGen:Heur.Mint.Hiamoe.20 (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.Click2.23542
ZillyaTrojan.Genome.Win32.185232
TrendMicroTROJ_GEN.R03BC0GC324
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
WebrootW32.Malware.Gen
GoogleDetected
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Win32.Genome
KingsoftWin32.Troj.Unknown.a
MicrosoftTrojan:Win32/Wacatac.B!ml
XcitiumMalware@#39s01zmj7r3wf
ArcabitTrojan.Mint.Hiamoe.20
GDataGen:Heur.Mint.Hiamoe.20
CynetMalicious (score: 100)
MAXmalware (ai score=100)
VBA32TScope.Trojan.VB
Cylanceunsafe
PandaGeneric Malware
RisingMalware.Undefined!8.C (TFE:5:qrgsiFTaFaT)
YandexTrojan.CL.VB!u9KxzzjDlbI
IkarusTrojan.Win32.VB
MaxSecureTrojan.Malware.3820329.susgen
FortinetW32/TrojanClicker_VB.NWD
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Malware.Heuristic.2046?

Malware.Heuristic.2046 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment