Malware

Symmi.45088 (B) removal guide

Malware Removal

The Symmi.45088 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Symmi.45088 (B) virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Reads data out of its own binary image
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to disable Windows Auto Updates
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

Related domains:

z.whorecord.xyz
a.tomx.xyz
ns1.musiczipz.com
ns1.musicmixa.net
ns1.musicmixa.org
ns1.musicmixb.co
ns1.musicmixc.com

How to determine Symmi.45088 (B)?


File Info:

crc32: 1AAD9C26
md5: a09c59cfa7cfa706953d0c14cc121081
name: A09C59CFA7CFA706953D0C14CC121081.mlw
sha1: 65d4411342ca66a199b3f3c1caea757685059ad1
sha256: c4fec3a01b044947de196982fa0bd374df92ff994e5f3bb7c19fe9f3b9d59a08
sha512: 361e541a86bd13fcce1365c9c00d80bfac8f9ab5bae7b1b1623360f80d3dfbc4cb07ccd6684ee4c90caf437f67ce922d32081b391620bc6062cae0c1cb68968e
ssdeep: 768:UaeBcZDQ+ib/iMXvH9h78LQDxb4WHVGKkGTkOthGn7wk52jfqFDV4PoTd57YENGh:reB3h7XVhiQ3fs8koyFFx57Yj3oJoFDh
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Symmi.45088 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Symmi.45088
FireEyeGeneric.mg.a09c59cfa7cfa706
CAT-QuickHealTrojan.Beebone.D
ALYacGen:Variant.Symmi.45088
CylanceUnsafe
VIPRETrojan.Win32.Vobfus.a (v)
AegisLabTrojan.Win32.Jorik.lwz0
SangforMalware
K7AntiVirusEmailWorm ( 0054d10f1 )
BitDefenderGen:Variant.Symmi.45088
K7GWEmailWorm ( 0054d10f1 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZevbaF.34804.gmW@auak68n
CyrenW32/Vobfus.O.gen!Eldorado
SymantecW32.Changeup
ESET-NOD32a variant of Win32/AutoRun.VB.AVG
BaiduWin32.Worm.VB.au
APEXMalicious
AvastWin32:VB-ACOY [Trj]
ClamAVWin.Trojan.VBTrojan3-6118226-0
KasperskyTrojan.Win32.VBKrypt.ltuh
AlibabaWorm:Win32/VBKrypt.2e7f48a5
NANO-AntivirusTrojan.Win32.VBKrypt.covjxo
ViRobotTrojan.Win32.Z.Vobfus.102400.ATP
RisingWorm.Win32.VBCode.ef (CLOUD)
Ad-AwareGen:Variant.Symmi.45088
TACHYONTrojan/W32.VB-VBKrypt.102400.AK
SophosML/PE-A + Mal/VBCheMan-J
ComodoMalware@#1bn8aizjhv4xg
F-SecureTrojan.TR/Barys.2229.jh.4
DrWebTrojan.DownLoader11.20151
TrendMicroTROJ_VBKRYPT_GA2509C0.UVPM
McAfee-GW-EditionBehavesLike.Win32.VBObfus.ct
EmsisoftGen:Variant.Symmi.45088 (B)
SentinelOneStatic AI – Malicious PE – Worm
JiangminTrojan/Vobfus.gaz
AviraTR/Barys.2229.jh.4
Antiy-AVLWorm/Win32.WBNA.gen
MicrosoftWorm:Win32/Vobfus.gen!U
ArcabitTrojan.Symmi.DB020
SUPERAntiSpywareTrojan.Agent/Gen-Vobfus
AhnLab-V3Trojan/Win32.VBKrypt.R357231
ZoneAlarmTrojan.Win32.VBKrypt.ltuh
GDataGen:Variant.Symmi.45088
CynetMalicious (score: 100)
TotalDefenseWin32/Vobfus.O!generic
McAfeeVBObfus.dv
MAXmalware (ai score=86)
VBA32SScope.Malware-Cryptor.VBCR.3042
MalwarebytesVobfus.Worm.Evasion.DDS
PandaW32/Vobfus.GEW.worm
TrendMicro-HouseCallTROJ_VBKRYPT_GA2509C0.UVPM
TencentWin32.Trojan.Vbkrypt.Lkxg
YandexTrojan.GenAsa!DXurx68NXHc
IkarusTrojan.Barys
MaxSecureTrojan.VBKrypt.ltuh
FortinetW32/VBObfus.AU!tr
AVGWin32:VB-ACOY [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Worm.VBKrypt.HgIASOYA

How to remove Symmi.45088 (B)?

Symmi.45088 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment