Malware

Razy.700619 (B) (file analysis)

Malware Removal

The Razy.700619 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.700619 (B) virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Checks the version of Bios, possibly for anti-virtualization
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

www.ip-adress.com

How to determine Razy.700619 (B)?


File Info:

crc32: 9D2F2AED
md5: 97b0e229b546a529e5df26151c53b566
name: 5555555.png
sha1: 488d95fc66ae5f36c6361d33c4ccbfc13214cb99
sha256: 533180f4ec869a6515c514ff4695bbc9f4ab30601eea979823a33f317c962506
sha512: bf3ad19c9a767bd5773fbdc0bcf106538aaf53fc55a1588e138597978f3d2220768285ee49072bedcaaa6852375ca5a862995bb1f4cda5398e0d4e5990adfdc9
ssdeep: 6144:PhyYoQTHwJ9v4s5w8CgXrEihrT075tIOLPygGzk23MOaXFpn6z:PheAsPXYirT07EObF23MOqjQ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: xa9 Microsoft Corporation. All rights reserved.
InternalName: dpapimig
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
CompanyName: Microsoft Corporation
ProductName: Microsoftxae Windowsxae Operating System
ProductVersion: 6.1.7600.16385
FileDescription: DPAPI Key Migration Wizard
OriginalFilename: dpapimig.exe
Translation: 0x0409 0x04b0

Razy.700619 (B) also known as:

MicroWorld-eScanGen:Variant.Razy.700619
FireEyeGeneric.mg.97b0e229b546a529
CylanceUnsafe
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderGen:Variant.Razy.700619
BitDefenderThetaGen:NN.ZexaF.34128.NI1@amfhBMii
SymantecML.Attribute.HighConfidence
APEXMalicious
GDataGen:Variant.Razy.700619
RisingMalware.Heuristic!ET#88% (RDMK:cmRtazrFoAsk9oNRWLHG0TEa0eGs)
Endgamemalicious (high confidence)
EmsisoftGen:Variant.Razy.700619 (B)
Invinceaheuristic
Trapminemalicious.high.ml.score
SophosTroj/Qbot-FS
IkarusTrojan.Qakbot
MAXmalware (ai score=88)
Antiy-AVLGrayWare/Win32.Kryptik.ehls
VBA32BScope.Trojan.Zenpak
Ad-AwareGen:Variant.Razy.700619
MalwarebytesTrojan.Emotet
ESET-NOD32a variant of Win32/GenKryptik.EMZS
SentinelOneDFI – Malicious PE
eGambitPE.Heur.InvalidSig
FortinetW32/GenKryptik.ELJF!tr
Cybereasonmalicious.c66ae5
Qihoo-360HEUR/QVM19.1.1C10.Malware.Gen

How to remove Razy.700619 (B)?

Razy.700619 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment