Malware

Ursu.730578 removal tips

Malware Removal

The Ursu.730578 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ursu.730578 virus can do?

  • The binary likely contains encrypted or compressed data.
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Ursu.730578?


File Info:

crc32: 40A15118
md5: c148128c5c2ea85312129b6065793609
name: mini.png
sha1: 289c129c3ab9a04dea66db6b60444b787283c589
sha256: 5c5d1a12696fce1ddb583a092ecad58679cd23aa7b2016bcfb2e2679eaa8daae
sha512: c267e1b080d6944eefbef2f909ebe2dc49f81f8dd7b2af32c2a4daaf52c31a35bf6a32e6edcf85f82a1b7bc89517d7bc2cf5131496192d894d94477ea5b37814
ssdeep: 6144:ItRxLKG7sYo6ovs5oorRN826Zyhmc03f9v2PYGLRIWSJHkwWJoS+3kfNZ5YZ:ITxLx7sYoh+RNtR031vdfHJWJo9yNZ5
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Ursu.730578 also known as:

McAfeeGenericRXAA-AA!C148128C5C2E
BitDefenderGen:Variant.Ursu.730578
APEXMalicious
Ad-AwareGen:Variant.Ursu.730578
Trapminemalicious.moderate.ml.score
WebrootW32.Trojan.Emotet
VBA32BScope.TrojanPSW.Spy

How to remove Ursu.730578?

Ursu.730578 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment