Ransom Trojan

Trojan.Ransom.Locky.DM removal guide

Malware Removal

The Trojan.Ransom.Locky.DM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Locky.DM virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • The binary likely contains encrypted or compressed data.
  • Behavior consistent with a dropper attempting to download the next stage.
  • Exhibits behavior characteristic of Locky ransomware
  • Anomalous binary characteristics

How to determine Trojan.Ransom.Locky.DM?


File Info:

crc32: A972DE41
md5: 2ede5803b260229bd90b33809a0f57d6
name: 2EDE5803B260229BD90B33809A0F57D6.mlw
sha1: 1fcc1d524e066aa0dfe59aa0fb346466e85603b1
sha256: 12776dd35ff6aa6f395d895333608c7a3084c7c9d8081a7198f744c883f413a4
sha512: 1edfd3bc21960d88509794314dd3d00fd0561d1aea521a702b537dcf6b8457e173f803b107c4aee2d6b70cfedd0d8821e7d1026209a4358f09435fb385eccbe5
ssdeep: 12288:V3JzZfZfZfZfZfZfZGZ2XsHUKwbNWuTncBxPMRS8SUC9H4jlNEz9vBiptAE43/:FJZfZfZfZfZfZfZGZ2XsHUK8ni0U8SU
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.Locky.DM also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 005190011 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.13570
CynetMalicious (score: 100)
CAT-QuickHealRansom.Exxroute.A4
McAfeeRansom-Locky!2EDE5803B260
CylanceUnsafe
ZillyaTrojan.Cryptor.Win32.173
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/Cryptor.d0d67fa0
K7GWTrojan ( 005190011 )
Cybereasonmalicious.3b2602
CyrenW32/S-a21d0748!Eldorado
SymantecRansom.Locky.B
ESET-NOD32a variant of Win32/Injector.DRTW
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Locky-7082716-0
KasperskyTrojan-Ransom.Win32.Cryptor.bzb
BitDefenderTrojan.Ransom.Locky.DM
NANO-AntivirusTrojan.Win32.Locky.eswbwb
ViRobotTrojan.Win32.Locky.655360
SUPERAntiSpywareRansom.Cerber/Variant
MicroWorld-eScanTrojan.Ransom.Locky.DM
TencentMalware.Win32.Gencirc.114965c6
Ad-AwareTrojan.Ransom.Locky.DM
SophosML/PE-A + Mal/Elenoocka-E
ComodoBackdoor.Win32.Poison.AD@7dp3ec
F-SecureHeuristic.HEUR/AGEN.1120888
BitDefenderThetaGen:NN.ZexaF.34608.OqW@aiCOQyd
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SMALY0
McAfee-GW-EditionBehavesLike.Win32.Worm.jc
FireEyeGeneric.mg.2ede5803b260229b
EmsisoftTrojan.Ransom.Locky.DM (B)
SentinelOneStatic AI – Malicious PE
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1120888
eGambitUnsafe.AI_Score_85%
Antiy-AVLTrojan/Win32.TSGeneric
MicrosoftRansom:Win32/Locky.A
ArcabitTrojan.Ransom.Locky.DM
AegisLabTrojan.Win32.Generic.4!c
ZoneAlarmTrojan-Ransom.Win32.Cryptor.bzb
GDataTrojan.Ransom.Locky.DM
TACHYONRansom/W32.Cryptor.655360
AhnLab-V3Win-Trojan/RansomCrypt.Exp
Acronissuspicious
VBA32Trojan.Encoder
MAXmalware (ai score=96)
MalwarebytesTrojan.PasswordStealer
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_CERBER.SMALY0
RisingRansom.Locky!8.1CD4 (C64:YzY0OnI+LEaeYFMW)
YandexTrojan.GenAsa!cDZDHmLo1gc
IkarusTrojan-Ransom.Locky
MaxSecureTrojan.Malware.1144424.susgen
FortinetW32/Kryptik.GKMB!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cryptor.HxQBFXsA

How to remove Trojan.Ransom.Locky.DM?

Trojan.Ransom.Locky.DM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment