Malware

Should I remove “Razy.158016”?

Malware Removal

The Razy.158016 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.158016 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Detected script timer window indicative of sleep style evasion
  • A named pipe was used for inter-process communication
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Attempts to delete volume shadow copies
  • Modifies boot configuration settings
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Razy.158016?


File Info:

crc32: BDD0C3A8
md5: a9b92f723f958a5f285770c078f08447
name: A9B92F723F958A5F285770C078F08447.mlw
sha1: ae985eda930634bad5d3f61265a37bf2b71ecc24
sha256: 879a2fead915dae2460849547884b70eac1c012a4f41c48e7b448a4ea2daad44
sha512: 92d99b51b9f8fff5fc92e95154f641203493629b057f3903fc49f8518748a5aa3b32657e83ba15f2d2d874252885cb0c60b47432c9ff3f1a9d1c9aab9054bfb6
ssdeep: 6144:03btmxVSMguRNDxYFCkJt8FWXW+3WCbp3piOW4fdBaTVaktWc:0rgAML7OCG8EWUp3pin4fKJ1
type: PE32 executable (GUI) Intel 80386 system file, for MS Windows

Version Info:

0: [No Data]

Razy.158016 also known as:

K7AntiVirusTrojan ( 004f76a01 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.10180
CynetMalicious (score: 100)
ALYacGen:Variant.Razy.158016
CylanceUnsafe
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/generic.ali2000010
K7GWTrojan ( 004f76a01 )
Cybereasonmalicious.23f958
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Filecoder.NHQ
APEXMalicious
AvastFileRepMalware
KasperskyTrojan-Ransom.Win32.SageCrypt.eps
BitDefenderGen:Variant.Razy.158016
NANO-AntivirusTrojan.Win32.SageCrypt.enkdxy
MicroWorld-eScanGen:Variant.Razy.158016
TencentMalware.Win32.Gencirc.114a1907
Ad-AwareGen:Variant.Razy.158016
SophosMal/Generic-S
ComodoMalware@#2wm89jq2520ou
BitDefenderThetaGen:NN.ZexaF.34608.uuX@ai9siMmi
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_MILICRY.F117DR
McAfee-GW-EditionBehavesLike.Win32.Dropper.fc
FireEyeGeneric.mg.a9b92f723f958a5f
EmsisoftGen:Variant.Razy.158016 (B)
SentinelOneStatic AI – Suspicious PE
AviraTR/Crypt.ZPACK.zxehk
eGambitUnsafe.AI_Score_99%
MicrosoftTrojan:Win32/Dynamer!ac
ArcabitTrojan.Razy.D26940
AegisLabTrojan.Win32.SageCrypt.j!c
GDataGen:Variant.Razy.158016
TACHYONRansom/W32.SageCrypt.331264
AhnLab-V3Trojan/Win32.SageCrypt.R197902
McAfeeGeneric.ayw
MAXmalware (ai score=81)
VBA32Hoax.SageCrypt
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/CI.A
TrendMicro-HouseCallRansom_MILICRY.F117DR
RisingRansom.FileCryptor!8.1A7 (C64:YzY0OvkpYubTgeGk)
IkarusTrojan-Ransom.GandCrab
FortinetW32/Filecoder.NHQ!tr
AVGFileRepMalware
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.SageCryp.HwoCP9sA

How to remove Razy.158016?

Razy.158016 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment