Ransom Trojan

Trojan-Ransom.Win32.Zerber.femg removal tips

Malware Removal

The Trojan-Ransom.Win32.Zerber.femg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.femg virus can do?

  • Executable code extraction
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Modifies boot configuration settings
  • Exhibits behavior characteristic of Cerber ransomware
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Ransom.Win32.Zerber.femg?


File Info:

crc32: 0F930CE6
md5: ae8b7793c23c6fdef1cb8114d873c9c7
name: AE8B7793C23C6FDEF1CB8114D873C9C7.mlw
sha1: f59e9ef7e2e81bc60190bad4ac1ea8d658e51346
sha256: 93f4d57e2ed8967e25b5f4c3bd58d4ad81030d7f11110f16762f167010b13c62
sha512: 3d048c2c148c0dd7def53c22169798f4cee0a51bba2575611d93c04af738b788b65dd708f69760ca7bb8de2f9a07868cb09b78e190530044818dafc97697f4e9
ssdeep: 6144:JjfZV8oenIcGy0gEv6J9/WDRlOBiFpckr6yjmty59LkvB5WNjRKsajNs:C1IcJFkR8BtkN99LqolRKpjN
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Somnus
InternalName: sixscores
FileVersion: 3.6.6803.0
CompanyName: Somnus
ProductName: sixscores seems
ProductVersion: 3.6.6803.0
FileDescription: sixscores louster cfd
OriginalFilename: sixscores.exe
Translation: 0x0409 0x04b0

Trojan-Ransom.Win32.Zerber.femg also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 004f27fc1 )
CynetMalicious (score: 100)
ALYacGen:Variant.Symmi.66021
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.2770964
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/Zerber.80a711e6
K7GWTrojan ( 004f27fc1 )
Cybereasonmalicious.3c23c6
ESET-NOD32a variant of Win32/Kryptik.FACZ
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Ransom.Win32.Zerber.femg
BitDefenderGen:Variant.Symmi.66021
NANO-AntivirusTrojan.Win32.Zerber.evdaor
MicroWorld-eScanGen:Variant.Symmi.66021
TencentWin32.Trojan.Zerber.Lpvf
Ad-AwareGen:Variant.Symmi.66021
SophosMal/Generic-R + Mal/Cerber-C
ComodoMalware@#26j8oy6d4qyrz
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionRansomware-GIX!AE8B7793C23C
FireEyeGeneric.mg.ae8b7793c23c6fde
EmsisoftGen:Variant.Symmi.66021 (B)
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1121409
MicrosoftRansom:Win32/Cerber.A
ArcabitTrojan.Symmi.D101E5
GDataGen:Variant.Symmi.66021
AhnLab-V3Trojan/Win32.Zerber.C2370755
McAfeeRansomware-GIX!AE8B7793C23C
MAXmalware (ai score=99)
VBA32BScope.Trojan.Encoder
PandaTrj/GdSda.A
RisingRansom.Zerber!8.518C (CLOUD)
YandexTrojan.Zerber!3Tq97T059xo
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.EYKI!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cerber.HgIASOYA

How to remove Trojan-Ransom.Win32.Zerber.femg?

Trojan-Ransom.Win32.Zerber.femg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment