Ransom

What is “Ransom:Win32/Tescrypt!pz”?

Malware Removal

The Ransom:Win32/Tescrypt!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Tescrypt!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Deletes executed files from disk

How to determine Ransom:Win32/Tescrypt!pz?


File Info:

name: 22F3CEB1CC0CC88055C1.mlw
path: /opt/CAPEv2/storage/binaries/029821da3d57821c91cc70e7f579c31efa9c3d0af955bf43cbd9342fdca5abff
crc32: 6DF75D92
md5: 22f3ceb1cc0cc88055c1c821b3fd7e7a
sha1: 8c435a0fd19458781fba8813281aa6b692da11a6
sha256: 029821da3d57821c91cc70e7f579c31efa9c3d0af955bf43cbd9342fdca5abff
sha512: 8e00a91f5bf739af20a7041d51cb7a67b4470f24ae74e8f508e83230b286c3ea7f8e8790576a2990e98e9ecd6c8457e356f1770e0cdc35ac041fae83301da30a
ssdeep: 1536:6TXAlc/IfEetY8AAl9D+Dmu34lHlTPSjez6OZaiwbUpuJAS0CmuJd4BXL:6Tqc/tetvAAmPIlHlTPje+alLJXBbd45
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T12F830254E3490EFFD4B222F243EA728439DB70C4626ECD5B89218DB04E51AF895FEC06
sha3_384: 5f068c1bed915e46d66518a8ffd3ddb7c3067d544890fc6a954eb5549cd2afe604d008a8b9afe1c7b43a94b29228f25f
ep_bytes: 68000000005a5381eea488cda181e8df
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Ransom:Win32/Tescrypt!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Copak.4!c
AVGWin32:Evo-gen [Trj]
tehtrisGeneric.Malware
DrWebTrojan.Packed2.43250
MicroWorld-eScanGen:Variant.Lazy.327786
FireEyeGeneric.mg.22f3ceb1cc0cc880
SkyhighBehavesLike.Win32.Generic.mc
McAfeeGenericRXAA-FA!22F3CEB1CC0C
Cylanceunsafe
VIPREGen:Variant.Lazy.327786
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005aef1b1 )
K7GWTrojan ( 005aef1b1 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.36802.fmY@aqxLbnk
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HITO
CynetMalicious (score: 100)
APEXMalicious
AvastWin32:Evo-gen [Trj]
ClamAVWin.Packed.Copak-9853643-0
KasperskyHEUR:Trojan.Win32.Copak.vho
BitDefenderGen:Variant.Lazy.327786
NANO-AntivirusTrojan.Win32.Agent.ixszcw
RisingTrojan.Kryptik!1.D238 (CLASSIC)
SophosTroj/Agent-BGZJ
F-SecureHeuristic.HEUR/AGEN.1331376
TrendMicroTrojan.Win32.COPAK.SMA.hp
EmsisoftGen:Variant.Lazy.327786 (B)
IkarusTrojan.Kryptik
JiangminTrojan.Copak.ceh
VaristW32/Copak.F.gen!Eldorado
AviraHEUR/AGEN.1331376
MAXmalware (ai score=89)
Antiy-AVLGrayWare/Win32.Wacapew
Kingsoftmalware.kb.b.958
MicrosoftRansom:Win32/Tescrypt!pz
XcitiumPacked.Win32.MUPX.Gen@24tbus
ArcabitTrojan.Lazy.D5006A
ZoneAlarmHEUR:Trojan.Win32.Copak.vho
GDataWin32.Trojan.PSE.7N8VJ8
GoogleDetected
AhnLab-V3Malware/Win32.Generic.R369371
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Lazy.327786
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TencentTrojan.Win32.Copak.hb
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HITO!tr
Cybereasonmalicious.1cc0cc
DeepInstinctMALICIOUS
alibabacloudVirTool:Win/Packed.XorPacker.UpxSection(dyn)

How to remove Ransom:Win32/Tescrypt!pz?

Ransom:Win32/Tescrypt!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment