Malware

Should I remove “Razy.754224”?

Malware Removal

The Razy.754224 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.754224 virus can do?

  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Razy.754224?


File Info:

name: 11CB89A0444C861DB675.mlw
path: /opt/CAPEv2/storage/binaries/31920c6cc805cdb55f84861abc5808781644586140fce30c8062bcf54f9b597b
crc32: BE3F020E
md5: 11cb89a0444c861db675b8fd752984b9
sha1: dca2d2b200e912c1af075ea55b36bcff5e263ec6
sha256: 31920c6cc805cdb55f84861abc5808781644586140fce30c8062bcf54f9b597b
sha512: d4a02deff4434456ddf59614cb400c86ab9ab890e6576b8ab5bb50621278e8012df2799a6cce8465fe9f52f2403ec096022ac772bc3f2196fdd0d7db314a50ca
ssdeep: 3072:6d5O1sE5o49H2shLUiqiXcFJKBh0KMMiU1m9:6+1s4ocHHwRiXcFJKBh0KNP
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
tlsh: T169C3BE61F78065E8E5FB257091EE92A8D6BC7C9041B24BDFA3CC3A0B68B53625C11F17
sha3_384: 3ae4d16d3930dbd78cbcfadf6becbe13e42a0df74f2488596510ccf88184fb20bb5ef67ef6fbf13e0e172cc18699891a
ep_bytes: 558bec538b5d0868b7570000518d4a66
timestamp: 1970-01-01 00:00:00

Version Info:

CompanyName: foobar2000.org
FileDescription: foobar2000
FileVersion: 0.9.2
LegalCopyright: © Peter Pawlowski. All rights reserved.
OriginalFilename: foobar2000_0.9.2.exe
ProductName: foobar2000
Translation: 0x0409 0x0000

Razy.754224 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.DNSKrab.lqx7
tehtrisGeneric.Malware
DrWebTrojan.Searcher.214
MicroWorld-eScanGen:Variant.Razy.754224
FireEyeGeneric.mg.11cb89a0444c861d
CAT-QuickHealTrojan.Vundo.Gen
SkyhighBehavesLike.Win32.Infected.ch
McAfeeGenericRXAA-AA!11CB89A0444C
Cylanceunsafe
ZillyaTrojan.Kryptik.Win32.700168
K7AntiVirusHacktool ( 005286a71 )
AlibabaTrojanDropper:Win32/Vundo.ef51dff8
K7GWHacktool ( 005286a71 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZedlaF.36744.hu8@aahTa9ni
VirITTrojan.Win32.Searcher.IG
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.OXX
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Kazy-5682
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Razy.754224
NANO-AntivirusVirus.Win32.Gen.ccmw
AvastWin32:MalOb-DQ [Cryp]
TencentWin32.Trojan.Generic.Zchl
EmsisoftGen:Variant.Razy.754224 (B)
F-SecureTrojan.TR/Crypt.ZPACK.Gen2
VIPREGen:Variant.Razy.754224
TrendMicroTROJ_VUNDO.SMIB
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
WebrootW32.Vundo.Gen
VaristW32/Virtumonde.BY.gen!Eldorado
AviraTR/Crypt.ZPACK.Gen2
MAXmalware (ai score=100)
Antiy-AVLTrojan/Win32.Unknown
Kingsoftmalware.kb.a.1000
MicrosoftTrojanDropper:Win32/Vundo.J
XcitiumTrojWare.Win32.Monder.wt@4fly69
ArcabitTrojan.Razy.DB8230
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Razy.754224
GoogleDetected
AhnLab-V3Trojan/Win32.Vundo.R5628
ALYacGen:Variant.Razy.754224
PandaGeneric Malware
TrendMicro-HouseCallTROJ_VUNDO.SMIB
RisingDropper.Vundo!8.6BA (TFE:2:aKYJa0mgVvP)
YandexTrojan.DL.DNSKrab!ppWlydHhxXQ
IkarusTrojan-Dropper.Win32.Vundo
MaxSecureTrojan.Malware.2431093.susgen
FortinetW32/Kryptik.IHN!tr
AVGWin32:MalOb-DQ [Cryp]
DeepInstinctMALICIOUS

How to remove Razy.754224?

Razy.754224 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment