Malware

Razy.840549 (B) removal guide

Malware Removal

The Razy.840549 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.840549 (B) virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Authenticode signature is invalid

How to determine Razy.840549 (B)?


File Info:

name: 7B2F5DF891FE1F18F9BA.mlw
path: /opt/CAPEv2/storage/binaries/9d8c30629860f76470c82a0d69b0d16d27b1ce631e2e658bd68d1dcb9d438a6c
crc32: D01B8895
md5: 7b2f5df891fe1f18f9ba182fd24610a4
sha1: 7884b45dd01c6ae2d0c6084f0a11ca8b8fba7ce7
sha256: 9d8c30629860f76470c82a0d69b0d16d27b1ce631e2e658bd68d1dcb9d438a6c
sha512: 94088ee3ecf18a9eb48edb71c204ddc260387e126294fdfb20b8fd6f66f0ef2a66ca8df9baa85d4643b42b07605f81ebe5e3b706e0f9aec8f08cd4d9ea25b43c
ssdeep: 12288:X7VVgR3cULGhmRXucC2wrTcN20bY/CwYWjAOjW5YfywsnArbS0c8XLmPPW:LrcPGhOspsN2tqwYaA95YfYnArb5ckm2
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B0C4013C2FDC5207C79E83B9A4F090A045B165017B47FFA9A91DAEA17B833E50D1626F
sha3_384: 921aeb2cfcdcbff175f0901360ef5874cc989177631e2bc2c4905cfc82b4f143aa982fc325149ee9a98242604cc9ed29
ep_bytes: ff2500c04700070300073300ac360000
timestamp: 2022-06-04 20:43:46

Version Info:

Translation: 0x0000 0x04b0
Comments: VLC media player
CompanyName: VLC media player
FileDescription: VLC media player
FileVersion: 3.0.3.0
InternalName: vlc.exe
LegalCopyright: Copyright © 1996-2018 VideoLAN and VLC Author
LegalTrademarks: VLC media player, VideoLAN and x264 are registered trademarks from VideoLAN
OriginalFilename: vlc.exe
ProductName: VLC media player
ProductVersion: 3.0.3.0
Assembly Version: 3.0.3.0

Razy.840549 (B) also known as:

BkavW32.AIDetectNet.01
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
CylanceUnsafe
SangforVirus.Win32.Save.a
BitDefenderGen:Variant.Razy.840549
Cybereasonmalicious.891fe1
ArcabitTrojan.Razy.DCD365
CyrenW32/MSIL_Agent.BTF.gen!Eldorado
ESET-NOD32a variant of MSIL/Kryptik.YFA
APEXMalicious
KasperskyHEUR:Trojan.MSIL.Injects.gen
MicroWorld-eScanGen:Variant.Razy.840549
Ad-AwareGen:Variant.Razy.840549
EmsisoftGen:Variant.Razy.840549 (B)
F-SecureHeuristic.HEUR/AGEN.1226402
McAfee-GW-EditionBehavesLike.Win32.Fareit.hc
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.7b2f5df891fe1f18
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1226402
MAXmalware (ai score=84)
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmHEUR:Trojan.MSIL.Injects.gen
GDataGen:Variant.Razy.840549
AhnLab-V3Malware/Win32.RL_Generic.C4148226
Acronissuspicious
ALYacGen:Variant.Razy.840549
MalwarebytesTrojan.MalPack.MSIL
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:HQhkNI/K2/BnXX1ZSZYQow)
IkarusTrojan.MSIL.Vmprotect
MaxSecureTrojan.Malware.300983.susgen
BitDefenderThetaGen:NN.ZemsilF.34712.Ju0@aKLSB2g
CrowdStrikewin/malicious_confidence_70% (D)

How to remove Razy.840549 (B)?

Razy.840549 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment