Ransom Trojan

Trojan.Ransom.AIG (B) removal instruction

Malware Removal

The Trojan.Ransom.AIG (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.AIG (B) virus can do?

  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Exhibits possible ransomware file modification behavior
  • Writes a potential ransom message to disk
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself

How to determine Trojan.Ransom.AIG (B)?


File Info:

crc32: 86C02421
md5: 8a64f057b1ac296a77099315e08195f1
name: 8A64F057B1AC296A77099315E08195F1.mlw
sha1: a3e73ddc237ceb350fe9d8c2652acbd98645b263
sha256: 96ddec0a48cbb912a34365fc9f079d1fbe93a93f6a69b9c243dc23771f08de8d
sha512: 92d8807a31af5185bc682dbc3837f8e431b9d8aa2cefe7406c52a9b946dcf26c3292c06d49f696b3ed5176fa85be31348ed0aa3770cbc7521c5736d7cd06341a
ssdeep: 6144:4pRmwGI8ZkjlnxHuMLXTIfxdpb+AoZLLIXroG7fg/:4bPGIvnjgj6LL+rt7f2
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

0: [No Data]

Trojan.Ransom.AIG (B) also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.94
MicroWorld-eScanTrojan.Ransom.AIG
FireEyeGeneric.mg.8a64f057b1ac296a
CAT-QuickHealTrojan.Ransom.FO4
ALYacTrojan.Ransom.AIG
CylanceUnsafe
VIPRETrojan.Win32.Ransom.fo (v)
AegisLabTrojan.Win32.Xorist.j!c
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005451b81 )
BitDefenderTrojan.Ransom.AIG
K7GWTrojan ( 005451b81 )
Cybereasonmalicious.7b1ac2
BitDefenderThetaGen:NN.ZexaF.34590.ymGfa0YytNdi
CyrenW32/Filecoder.Y.gen!Eldorado
SymantecRansom.CryptoTorLocker
TotalDefenseWin32/Ransom.A!generic
APEXMalicious
AvastFileRepMalware
ClamAVWin.Trojan.CryptoTorLocker2015-1
KasperskyTrojan-Ransom.Win32.Xorist.ln
AlibabaRansom:Win32/generic.ali2000010
NANO-AntivirusTrojan.Win32.Xorist.dxuuhl
ViRobotTrojan.Win32.A.Xorist.1268736[UPX]
RisingRansom.Sorikrypt!8.8822 (CLOUD)
Ad-AwareTrojan.Ransom.AIG
EmsisoftTrojan.Ransom.AIG (B)
ComodoTrojWare.Win32.Kryptik.ER@4o1ar2
F-SecureTrojan.TR/Ransom.Xorist.EJ
BaiduWin32.Trojan.Filecoder.g
TrendMicroRansom_XORIST.SMA
McAfee-GW-EditionRansom-FASZ!55B0DFDFA99B
SophosMal/Generic-R + Troj/Ransom-EY
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Xorist.js
WebrootW32.Ransom
AviraTR/Ransom.Xorist.EJ
MAXmalware (ai score=80)
Antiy-AVLTrojan[Ransom]/Win32.Xorist
MicrosoftRansom:Win32/Sorikrypt
GridinsoftRansom.Win32.Ransom.sa
ArcabitTrojan.Ransom.AIG
ZoneAlarmTrojan-Ransom.Win32.Xorist.ln
GDataWin32.Trojan-Ransom.Xorist.D
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Xorist.R25524
McAfeeArtemis!8A64F057B1AC
VBA32Hoax.Xorist
MalwarebytesRansom.Xorist
PandaTrj/RansomXor.A
ESET-NOD32a variant of Win32/Filecoder.Q
TrendMicro-HouseCallRansom_XORIST.SMA
TencentTrojan.Win32.CryptoTorLocker2015.a
YandexTrojan.GenAsa!/o0pq2Faa4I
IkarusTrojan-Ransom.Xorist
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Xorist.DD8C!tr.ransom
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Win32/Ransom.Xorist.HwsBmZsA

How to remove Trojan.Ransom.AIG (B)?

Trojan.Ransom.AIG (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment