Categories: RansomTrojan

About “Trojan-Ransom.Win32.Zerber.feuy” infection

The Trojan-Ransom.Win32.Zerber.feuy is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.feuy virus can do?

  • Executable code extraction
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process created a hidden window
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Modifies boot configuration settings
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Ransom.Win32.Zerber.feuy?


File Info:

crc32: D1FC1AAEmd5: a4009f5e7cc8a160b984f697a306e3a1name: A4009F5E7CC8A160B984F697A306E3A1.mlwsha1: 96f7950ed6296b58867de2d570a1127f4781b877sha256: 8bc7eb2276cb4e059da104a1654e9604dbb60ae7dd364aa09d0728e9eb27fc2dsha512: 689463bb846793c70416af2f0aed065e223ac9b865439e0486841219bd7697e43f4b3fe89ed5dfd333ba01029281441447f84eaa98e3bdac5da9a1ea52e28e4fssdeep: 3072:fxg44y1xDNeBAopsuXaIz4EtVsVYf9IuT+Qa9bPZw0J27EkUFvpp:Jg44KmtSAae40VsVCCuT+QQPfQ4kUFtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Bibliognost OctineInternalName: wheechingFileVersion: 10.7.7630.44546CompanyName: Bibliognost OctineProductName: wheeching expdtProductVersion: 10.7.7630.44546FileDescription: wheeching colymbiformOriginalFilename: wheeching.exeTranslation: 0x0409 0x04b0

Trojan-Ransom.Win32.Zerber.feuy also known as:

Bkav W32.AIDetect.malware1
K7AntiVirus Trojan ( 0048cbe01 )
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.4691
Cynet Malicious (score: 100)
ALYac Trojan.GenericKD.44140656
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Ransom:Win32/Zerber.4ea2bfde
K7GW Trojan ( 0048cbe01 )
Cybereason malicious.e7cc8a
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.EYLT
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan-Ransom.Win32.Zerber.feuy
BitDefender Trojan.GenericKD.44140656
NANO-Antivirus Trojan.Win32.Zerber.evdfvx
MicroWorld-eScan Trojan.GenericKD.44140656
Tencent Win32.Trojan.Zerber.Lizo
Ad-Aware Trojan.GenericKD.44140656
Sophos Mal/Generic-S
Comodo Malware@#2ugbbemyhfr48
F-Secure Heuristic.HEUR/AGEN.1121409
BitDefenderTheta Gen:NN.ZevbaF.34608.kq0@aeXxcxoi
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition Generic.cux
FireEye Generic.mg.a4009f5e7cc8a160
Emsisoft Trojan.GenericKD.44140656 (B)
SentinelOne Static AI – Malicious PE
Avira HEUR/AGEN.1121409
Microsoft Ransom:Win32/Cerber
Arcabit Trojan.Generic.D2A18870
AegisLab Trojan.Win32.Generic.4!c
ZoneAlarm Trojan-Ransom.Win32.Zerber.feuy
GData Trojan.GenericKD.44140656
Acronis suspicious
McAfee Generic.cux
MAX malware (ai score=100)
Panda Trj/GdSda.A
Rising Ransom.Zerber!8.518C (CLOUD)
Yandex Trojan.Zerber!zbOmW62r5h8
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.7164915.susgen
Fortinet W32/Kryptik.EYKI!tr
AVG Win32:Malware-gen
Paloalto generic.ml
Qihoo-360 Win32/Ransom.Cerber.HxQB2GYA

How to remove Trojan-Ransom.Win32.Zerber.feuy?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

How to remove “UDS:Trojan-Downloader.JS.SLoad”?

The UDS:Trojan-Downloader.JS.SLoad is considered dangerous by lots of security experts. When this infection is active,…

13 mins ago

What is “Malware.AI.521121088”?

The Malware.AI.521121088 is considered dangerous by lots of security experts. When this infection is active,…

40 mins ago

How to remove “Worm:Win32/Korgo.V”?

The Worm:Win32/Korgo.V is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

Worm.Win32.Vobfus.dlcn (file analysis)

The Worm.Win32.Vobfus.dlcn is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

Win32/Adware.InternetAntivirus removal instruction

The Win32/Adware.InternetAntivirus is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

TrojanDownloader:Win32/Unruy.A removal instruction

The TrojanDownloader:Win32/Unruy.A is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago