Malware

Razy.778593 malicious file

Malware Removal

The Razy.778593 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.778593 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Razy.778593?


File Info:

name: DCC3C003A929C2530B1D.mlw
path: /opt/CAPEv2/storage/binaries/136c9ed289fc75a39e3424da9dffc8d8bcf417d8324825c8cab556da4ef3bcfb
crc32: 66E7B98E
md5: dcc3c003a929c2530b1d4775f9121fc1
sha1: 7932ea738d3504c50f8d98cb3b133820e730e267
sha256: 136c9ed289fc75a39e3424da9dffc8d8bcf417d8324825c8cab556da4ef3bcfb
sha512: f9541256299048b062426da4b516407a32df13b3befa429ee1bf655077843ac76aafaf0cc97518e3654ab74be4084663531bcaddad3bd30f22fbb420b68b1035
ssdeep: 49152:kOil0gxbV8xgClgCo/ugD8xgClgoyTIgDL:kOilJbV8ztaZ8z3KvL
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T19766580B2E5D8BB2CE0A337D68BF9F614400AEAD671EB2F9234B65727D51FC1E185520
sha3_384: c29ce09c4e192f05ecf799543034c114a54f8d3701e7747dfc28f9797666adf035030f0bd48155160b0e7205035e830d
ep_bytes: cdc8821b9da1069c98400f0d1a0a67b7
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Razy.778593 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.778593
ClamAVWin.Packed.Razy-9807391-0
CAT-QuickHealTrojan.Glupteba.S17234490
SkyhighBehavesLike.Win32.Corrupt.vh
McAfeeTrojan-FVOQ!DCC3C003A929
Cylanceunsafe
ZillyaTrojan.Kryptik.Win32.3105278
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.38d350
ArcabitTrojan.Razy.DBE161 [many]
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.GIFY
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.folb
BitDefenderGen:Variant.Razy.778593
NANO-AntivirusTrojan.Win32.Kryptik.fhkvlb
AvastWin32:PWSX-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
TACHYONTrojan/W32.Selfmod
SophosMal/Inject-GJ
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.PackedENT.216
VIPREGen:Variant.Razy.778593
EmsisoftGen:Variant.Razy.778593 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.cvxzt
GoogleDetected
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmTrojan.Win32.Copak.folb
GDataWin32.Trojan.PSE.15NLAT
VaristW32/Trojan.MJSE-7842
AhnLab-V3Trojan/Win.OB.C5394211
Acronissuspicious
VBA32Trojan.Copak
MAXmalware (ai score=84)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
YandexTrojan.Selfmod!9PBVLJlnE2k
IkarusTrojan.Win32.Glupteba
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Kryptik.GIFQ!tr
BitDefenderThetaGen:NN.ZexaF.36680.@@Z@autBeKp
AVGWin32:PWSX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Razy.778593?

Razy.778593 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment