Malware

Should I remove “Razy.835226 (B)”?

Malware Removal

The Razy.835226 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.835226 (B) virus can do?

  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid

How to determine Razy.835226 (B)?


File Info:

name: BF0D34C360CEC9B56C81.mlw
path: /opt/CAPEv2/storage/binaries/ef2e704390c03d39abfc9c20fc3ba22f3b1b7534216644717fe4310492e4cf44
crc32: 58CB7197
md5: bf0d34c360cec9b56c81e167b18b2e45
sha1: 10cc255cbe59aaf7516ba1e8212a87605c785156
sha256: ef2e704390c03d39abfc9c20fc3ba22f3b1b7534216644717fe4310492e4cf44
sha512: 6fac3728bf6ae52cad612c4d5e5760a4609a1aeafb141a6ff0604a0c58d13aafb852b287cfa694937f57781773319a8f32834a2df284782d1ec9f72df44d4732
ssdeep: 1536:igRbDvV42zytUK9rS7RhhBBIMBBuixi16o0fDjH3CIyHCQ6:/bmhtoIMg0nH3C5CQ6
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D1040006DED20AAAC417D13B80CC582055DD6EDC6CE89086F391B68757F708E6CAFE76
sha3_384: 448b7c8540bf536b330020fbe8629a6a22eee27f14d3379fb3224282932f7dc088f2ed1dfb897289ba2e171dced246a4
ep_bytes: ff250020400000000000000000000000
timestamp: 2020-04-25 22:40:13

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription: interface
FileVersion: 1.0.0.0
InternalName: @interface.exe
LegalCopyright: Copyright © 2020
LegalTrademarks:
OriginalFilename: @interface.exe
ProductName: interface
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Razy.835226 (B) also known as:

LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.835226
CAT-QuickHealTrojan.YakbeexMSIL.ZZ4
McAfeeGenericRXKA-UR!BF0D34C360CE
CylanceUnsafe
ZillyaTrojan.Tiny.Win32.9280
SangforTrojan.Win32.Occamy.CEF
K7AntiVirusTrojan ( 005662d51 )
AlibabaTrojanDownloader:MSIL/ClipBanker.d5e335b7
K7GWTrojan ( 005662d51 )
Cybereasonmalicious.360cec
BitDefenderThetaGen:NN.ZemsilF.34062.lm0@aeeCufb
CyrenW32/MSIL_Tiny.D.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Tiny.DJ
TrendMicro-HouseCallTROJ_GEN.R002C0DL521
Paloaltogeneric.ml
ClamAVWin.Packed.Ashify-9833473-0
BitDefenderGen:Variant.Razy.835226
NANO-AntivirusTrojan.Win32.Tiny.htemdq
SUPERAntiSpywareTrojan.Agent/Gen-Tiny
AvastWin32:TrojanX-gen [Trj]
TencentWin32.Trojan.Razy.Pgcz
Ad-AwareGen:Variant.Razy.835226
EmsisoftGen:Variant.Razy.835226 (B)
ComodoMalware@#mglvu82tqzyj
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R002C0DL521
FireEyeGeneric.mg.bf0d34c360cec9b5
SophosMal/Generic-S
IkarusTrojan.MSIL.ClipBanker
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1133519
Antiy-AVLTrojan/Generic.ASMalwS.303F41B
MicrosoftTrojanDownloader:MSIL/Tiny.AMP!MTB
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Razy.DCBE9A
GDataGen:Variant.Razy.835226
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.C4074945
ALYacGen:Variant.Razy.835226
MAXmalware (ai score=88)
MalwarebytesTrojan.Crypt
APEXMalicious
YandexTrojan.Tiny!tcvX0G24UFA
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_94%
FortinetMSIL/Tiny.DJ!tr
AVGWin32:TrojanX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Razy.835226 (B)?

Razy.835226 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment