Malware

Razy.136398 removal instruction

Malware Removal

The Razy.136398 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.136398 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Sniffs keystrokes
  • Attempts to remove evidence of file being downloaded from the Internet
  • Executed a process and injected code into it, probably while unpacking
  • A process attempted to delay the analysis task by a long amount of time.
  • Exhibits behavior characteristic of iSpy Keylogger
  • Creates a hidden or system file
  • Creates a copy of itself

Related domains:

rootml.hopto.org

How to determine Razy.136398?


File Info:

crc32: 19EB66AF
md5: 178bdf4a668466a69b8aae0d26124542
name: 178BDF4A668466A69B8AAE0D26124542.mlw
sha1: a04e64f930dbca7c579a829a999e3d2212c3ba3c
sha256: dd624f6f15bcd86b2b680006f133e03924887c2ded0bf93c24c5e5bfe9d097fb
sha512: 23d58a52b58b03f95bd30283fd24601be6759724493f208403050ad229bea1ca00d2a73d2457801bb318f7755dfe119fd2aff035cc6fd40c0d3f181bf11d9a84
ssdeep: 24576:1s9ZfhxgFsNkPyuXmYCG5OVGcEk+QzU3y/Eb08o:OcFykPZXaKw+QzqV0
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 2015
Assembly Version: 1.0.1.5
InternalName: Cryptics VPN.exe
FileVersion: 1.0.1.5
CompanyName: Gocryptic.com
LegalTrademarks:
Comments: Cryptic's VPN Client
ProductName: Sutton2k9
ProductVersion: 1.0.1.5
FileDescription: Cryptic's VPN
OriginalFilename: Cryptics VPN.exe

Razy.136398 also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.136398
FireEyeGeneric.mg.178bdf4a668466a6
ALYacGen:Variant.Razy.136398
CylanceUnsafe
AegisLabTrojan.Win32.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 005036601 )
BitDefenderGen:Variant.Razy.136398
K7GWTrojan ( 005036601 )
Cybereasonmalicious.a66846
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:RATX-gen [Trj]
ClamAVWin.Packed.Razy-6849099-0
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Razy.emgyqr
Ad-AwareGen:Variant.Razy.136398
SophosML/PE-A + Troj/MSIL-JHH
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.DownLoader23.56310
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
EmsisoftGen:Variant.Razy.136398 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Win32.AGeneric
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojanSpy:MSIL/Golroted.B
ArcabitTrojan.Razy.D214CE
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Razy.136398
CynetMalicious (score: 85)
McAfeeTrojan-FLJP!178BDF4A6684
MAXmalware (ai score=82)
MalwarebytesMachineLearning/Anomalous.95%
PandaTrj/GdSda.A
ESET-NOD32a variant of MSIL/Injector.RFL
YandexTrojan.Agent!ekEpJs6ShT8
IkarusTrojan-Spy.Agent
FortinetMSIL/Injector.MEG!tr
BitDefenderThetaGen:NN.ZemsilF.34804.ar0@ay6hn8n
AVGWin32:RATX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_80% (D)
Qihoo-360Generic/Trojan.dd2

How to remove Razy.136398?

Razy.136398 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment