Malware

Razy.611787 information

Malware Removal

The Razy.611787 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.611787 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid

How to determine Razy.611787?


File Info:

name: FBC07589202DF8D0D5FA.mlw
path: /opt/CAPEv2/storage/binaries/ec891b4226c4c47089d99188068c32cea55cf9f881c0182cd43bdc1caf75629c
crc32: 59BDE5BD
md5: fbc07589202df8d0d5fa787ea95df830
sha1: a9651724b4604605249cb08fff61b0707c5dfe4f
sha256: ec891b4226c4c47089d99188068c32cea55cf9f881c0182cd43bdc1caf75629c
sha512: 227c18c21be19c1978d4a670b6d34f62c15561cd9727e69d9c73ded4d94019192b647c3e56a01344459c23ee76722ecae880853aefabe6665f6833ffe0f3c4d4
ssdeep: 768:/d8yLcy0GAqqE6aO+nNahAXHHrjszqzJEt:/d8yQy0GCaO+nNahA6qz2t
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19EE2C71BFB546221F185C2B22E35865A98697C720540DD0FFBC67E9C38716C3A9F0B2B
sha3_384: 08ab20f7d2b2d8448fc37170cb9cc82c0cf0dc30c7ac76fb2cfc11ed73c1bd068634835da40e9f76be9b8f3ddaddb6c2
ep_bytes: 68e0154000e8f0ffffff000000000000
timestamp: 2010-09-17 03:33:37

Version Info:

Translation: 0x0804 0x04b0
CompanyName: ddd
ProductName: ddd
FileVersion: 1.00
ProductVersion: 1.00
InternalName: b
OriginalFilename: b.exe

Razy.611787 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.VB.lkln
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Razy.611787
ClamAVWin.Downloader.Zusy-7086154-0
FireEyeGeneric.mg.fbc07589202df8d0
SkyhighBehavesLike.Win32.BadFile.nt
ALYacGen:Variant.Razy.611787
Cylanceunsafe
ZillyaTrojan.VB.Win32.156906
SangforSuspicious.Win32.Save.vb
K7AntiVirusP2PWorm ( 001911b31 )
AlibabaTrojan:Win32/Sisproc.c4067622
K7GWP2PWorm ( 001911b31 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaAI:Packer.525D9CE220
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/VB.PHC
APEXMalicious
CynetMalicious (score: 100)
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Variant.Razy.611787
NANO-AntivirusTrojan.Win32.DownLoad1.ecckyo
AvastWin32:VB-RGS [Trj]
TencentMalware.Win32.Gencirc.10b952be
SophosML/PE-A
F-SecureTrojan.TR/Dropper.Gen5
DrWebTrojan.DownLoad1.64386
VIPREGen:Variant.Razy.611787
EmsisoftGen:Variant.Razy.611787 (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.611787
JiangminTrojan.Generic.aebfw
GoogleDetected
AviraTR/Dropper.Gen5
Antiy-AVLTrojan/Win32.SGeneric
KingsoftWin32.Troj.Unknown.a
XcitiumTrojWare.Win32.VB.aicx@4mwtzs
ArcabitTrojan.Razy.D955CB
ZoneAlarmUDS:DangerousObject.Multi.Generic
MicrosoftTrojan:Win32/Sisproc!gmb
VaristW32/VB.BC.gen!Eldorado
AhnLab-V3Downloader/Win32.VB.R22130
McAfeeGenericRXAA-AA!FBC07589202D
MAXmalware (ai score=100)
VBA32Trojan.VBRA.017899
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/Genetic.gen
RisingAdWare.Win32.VBCode.ew (CLASSIC)
IkarusTrojan-Downloader.Win32.VB
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Klink.FN!tr.dldr
AVGWin32:VB-RGS [Trj]
Cybereasonmalicious.4b4604
DeepInstinctMALICIOUS

How to remove Razy.611787?

Razy.611787 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment