Ransom

Generic.Ransom.Xorist.7E2D8DD9 removal

Malware Removal

The Generic.Ransom.Xorist.7E2D8DD9 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.Ransom.Xorist.7E2D8DD9 virus can do?

  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Exhibits possible ransomware file modification behavior
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Generic.Ransom.Xorist.7E2D8DD9?


File Info:

crc32: C5753187
md5: 082cc297a305b4e26d13b9294032e8a8
name: 082CC297A305B4E26D13B9294032E8A8.mlw
sha1: 6f13afa7252b184098ba8b8a23bcb070a4cf326c
sha256: b956bdf4317bdf883c285eee8f7c02768d4a389198935b019e814d3e5b80afd8
sha512: 99d9b7d34ed9ad787948a32a8fd7dadd0c0e017a223aa0534bb58a8a140be8e43d39bc9807b7f98ece260d1ab983053bae30d03891c741060d0c82526c272c43
ssdeep: 1536:rI289vSa6/r/c1ZywrlU0xCVZx4J6TQCwHD1CqT+AxFlmH5ZofTd:rA6h/EFxC7x4J6H2DGANU5Zob
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Generic.Ransom.Xorist.7E2D8DD9 also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 005451b81 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.94
CynetMalicious (score: 100)
CAT-QuickHealRansom.Genasom.FO4
ALYacTrojan.Ransom.Xorist
CylanceUnsafe
ZillyaTrojan.Xorist.Win32.1112
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaRansom:Win32/Xorist.cb7aeffe
K7GWTrojan ( 005451b81 )
Cybereasonmalicious.7a305b
BaiduWin32.Trojan.Filecoder.g
CyrenW32/Filecoder.Y.gen!Eldorado
SymantecRansom.CryptoTorLocker
ESET-NOD32a variant of Win32/Filecoder.Q
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Trojan.CryptoTorLocker2015-1
KasperskyTrojan-Ransom.Win32.Xorist.gf
BitDefenderGeneric.Ransom.Xorist.7E2D8DD9
NANO-AntivirusTrojan.Win32.Xorist.rhtgz
ViRobotTrojan.Win32.A.Xorist.504320[UPX]
MicroWorld-eScanGeneric.Ransom.Xorist.7E2D8DD9
TencentTrojan.Win32.CryptoTorLocker2015.a
Ad-AwareGeneric.Ransom.Xorist.7E2D8DD9
SophosML/PE-A + Troj/Ransom-EY
ComodoTrojWare.Win32.Kryptik.ER@4o1ar2
BitDefenderThetaGen:NN.ZexaF.34688.fmGfaar0ecoi
VIPRETrojan.Win32.Ransom.fo (v)
TrendMicroRansom_XORIST.SMA
McAfee-GW-EditionBehavesLike.Win32.Generic.mc
FireEyeGeneric.mg.082cc297a305b4e2
EmsisoftGeneric.Ransom.Xorist.7E2D8DD9 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Generic.xupo
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1114186
eGambitUnsafe.AI_Score_99%
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftRansom:Win32/Sorikrypt.A
AegisLabTrojan.Win32.Xorist.j!c
GDataGeneric.Ransom.Xorist.7E2D8DD9
TACHYONTrojan/W32.Xorist.628736
AhnLab-V3Trojan/Win32.Xorist.R61245
Acronissuspicious
McAfeeArtemis!082CC297A305
MAXmalware (ai score=100)
VBA32BScope.TrojanRansom.Xorist
PandaTrj/CI.A
TrendMicro-HouseCallRansom_XORIST.SMA
RisingRansom.Sorikrypt!8.8822 (CLOUD)
YandexTrojan.GenAsa!BiN1E6e8pFA
IkarusTrojan-Ransom.Xorist
FortinetW32/Xorist.DD8C!tr.ransom
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Generic.Ransom.Xorist.7E2D8DD9?

Generic.Ransom.Xorist.7E2D8DD9 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment