Malware

Razy.28927 information

Malware Removal

The Razy.28927 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.28927 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process created a hidden window
  • Executed a process and injected code into it, probably while unpacking
  • A process attempted to delay the analysis task by a long amount of time.
  • Exhibits behavior characteristic of Nymaim malware
  • Zeus P2P (Banking Trojan)
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

dpaodauasr.net
fmuyl.net
aewlckpojqm.com
icpwaychn.com
jmpkswo.com
vscaagiats.in
jzhhkw.com
zcetvnitsfk.com
mdxmlyhfypji.pw
ugzbdrvwewm.net
vwqnwicvngys.com
kermtrz.in
splsqr.com
ovhugyr.in
elxabcz.in

How to determine Razy.28927?


File Info:

crc32: 059FF7C0
md5: 56b7ec2804d44b5a5f78c67bd72cdd4f
name: 56B7EC2804D44B5A5F78C67BD72CDD4F.mlw
sha1: 78ba17e7ee41561da49498de73ea51b11df59229
sha256: dd633c0b8a946a2f083d08cb12465b86c5907e1154c0b31deaad7aa567214c0f
sha512: dab90acc2f89969567774a6724e230c83a9a046068515005c98a12638c49e28157b437d6565c38af9c6d0558c83825d404d4174d78b7f59847e88467c648d247
ssdeep: 12288:vEMGAoj2bLTvyAyxz6rx3i7isSvrKmUESmCYKrAKNorksu:vzWCb/vyXqWiTHUeCYKrAKurkN
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: 2005-2010 COMODO. All rights reserved.
FileVersion: 6.3.3.0
CompanyName: OpenOffice.org
ProductName: COMODO lnstaller
ProductVersion: 9.4.4.8
FileDescription: COMODO lnstaller
Translation: 0x0409 0x0000

Razy.28927 also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.28927
FireEyeGeneric.mg.56b7ec2804d44b5a
Qihoo-360Win32/Trojan.039
McAfeeGenericR-HBB!56B7EC2804D4
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 004e04341 )
BitDefenderGen:Variant.Razy.28927
K7GWTrojan ( 004e04341 )
Cybereasonmalicious.804d44
CyrenW32/Nymaim.U.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Agent.ekunll
RisingDownloader.Nymaim!8.781 (TFE:1:cAZLdaHa4PK)
Ad-AwareGen:Variant.Razy.28927
EmsisoftGen:Variant.Razy.28927 (B)
ComodoMalware@#3h4heedjmolur
F-SecureTrojan.TR/Taranis.2589
DrWebTrojan.Inject2.16783
ZillyaBackdoor.Matsnu.Win32.621
TrendMicroTROJ_DYNAMER_FC25001D.UVPM
McAfee-GW-EditionGenericR-HBB!56B7EC2804D4
SophosMal/Generic-S
IkarusTrojan-Downloader.Win32.Nymaim
JiangminTrojan.Generic.gltij
AviraTR/Taranis.2589
MAXmalware (ai score=86)
Antiy-AVLTrojan[Backdoor]/Win32.Matsnu
MicrosoftTrojan:Win32/Dynamer!ac
ArcabitTrojan.Razy.D70FF
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Razy.28927
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Dynamer.R177093
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34804.Ju1@a0QvnPni
ALYacGen:Variant.Razy.28927
VBA32BScope.Trojan.Inject
MalwarebytesMalware.Heuristic.1001
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.EQJI
TrendMicro-HouseCallTROJ_DYNAMER_FC25001D.UVPM
YandexTrojan.Agent!yl6yACX5GvM
eGambitPE.Heur.InvalidSig
FortinetW32/Kryptik.ERNO!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Razy.28927?

Razy.28927 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment