Malware

Razy.760360 (B) malicious file

Malware Removal

The Razy.760360 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.760360 (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Starts servers listening on 0.0.0.0:443
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Stores JavaScript or a script command in the registry, likely for persistence or configuration
  • Creates a hidden or system file
  • Operates on local firewall’s policies and settings
  • Anomalous binary characteristics

How to determine Razy.760360 (B)?


File Info:

crc32: 79EA4604
md5: e5b13246d1012720f98a99172a440e07
name: E5B13246D1012720F98A99172A440E07.mlw
sha1: 3e9ef52b963f120c9ca5da1a23aac8408b09c6a4
sha256: cdbca886e920a020ece308c39374b3ff0afb91ed1e76441a2ed4ebf7185cd0c4
sha512: daeb2d3fd35975775edf3f2856a977f87f3f2ae2f6d6fcaa39e31db00252d540b683a6684f0c510554b493d1170b44aa5615f50a35d5db20f2265df929e6a4ac
ssdeep: 12288:LrcppXZ0b0exu8aDuoQ90sHd1ToS9YdfecpC/x5jMlJQbB9WMuuLqa8EmyCg:3wE0cu8aiT9hd1T34WckJuzOf8Emy7
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Razy.760360 (B) also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.760360
FireEyeGeneric.mg.e5b13246d1012720
ALYacGen:Variant.Razy.760360
CylanceUnsafe
SangforMalware
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderGen:Variant.Razy.760360
K7GWTrojan ( 005702a91 )
K7AntiVirusTrojan ( 005702a91 )
CyrenW32/Kryptik.CCI.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:BankerX-gen [Trj]
ClamAVWin.Packed.Generickdz-9772324-0
KasperskyHEUR:Trojan-Banker.Win32.Cridex.pef
NANO-AntivirusTrojan.Win32.Cridex.iaiokg
TencentMalware.Win32.Gencirc.10ce0c6b
Ad-AwareGen:Variant.Razy.760360
EmsisoftGen:Variant.Razy.760360 (B)
F-SecureHeuristic.HEUR/AGEN.1138986
DrWebTrojan.Packed2.42617
InvinceaMal/Generic-S
McAfee-GW-EditionTrojan-FRGC!E5B13246D101
MaxSecureBanker.Win64.Emotet.sb
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
JiangminTrojan.Banker.Cridex.ald
AviraHEUR/AGEN.1138986
MAXmalware (ai score=88)
MicrosoftTrojan:Win32/Dridex.MS!MTB
GridinsoftTrojan.Win32.Packed.oa!s2
ArcabitTrojan.Razy.DB9A28
ZoneAlarmHEUR:Trojan-Banker.Win32.Cridex.pef
GDataGen:Variant.Razy.760360
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.MalPe.R352718
McAfeeTrojan-FRGC!E5B13246D101
VBA32BScope.Trojan.Inject
MalwarebytesTrojan.Dridex
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HGLY
RisingTrojan.Kryptik!8.8 (TFE:1:sbQG4bAmJZD)
SentinelOneStatic AI – Suspicious PE
eGambitUnsafe.AI_Score_93%
FortinetW32/Kryptik.HGLY!tr
BitDefenderThetaGen:NN.ZedlaF.34634.aX4@amDlnYli
AVGWin32:BankerX-gen [Trj]
Qihoo-360HEUR/QVM39.1.3FBB.Malware.Gen

How to remove Razy.760360 (B)?

Razy.760360 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment