Ransom Trojan

About “Trojan-Ransom.Win32.Zerber.fjzj” infection

Malware Removal

The Trojan-Ransom.Win32.Zerber.fjzj is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.fjzj virus can do?

  • The binary likely contains encrypted or compressed data.
  • Anomalous binary characteristics

How to determine Trojan-Ransom.Win32.Zerber.fjzj?


File Info:

crc32: 2AA363DD
md5: a3f3e9019cd20769a5914614a6cd0dd8
name: A3F3E9019CD20769A5914614A6CD0DD8.mlw
sha1: 6fb9b407e0f6cc924443f24e0858f6ac978dba04
sha256: df229912be550b6ddac77e3a497a53ed8101c542ad6779f8c6a5c4a6f26b94c6
sha512: fab932e3452740960a33bdc11e8f38325db6e747ca156b9753dacacb1c4e680b2691ba230e1ab7cefcc50fb94d6d597b34a5d20eef34499c4dba21b9a9d3cb50
ssdeep: 3072:5nTDTwCq0v4ug+leGNSnc4g5wbFKefBNoySfbyR74Tb4oOOn9iI1Jh5NS+fKUEI:BihQyU5CFL0yWyZ4Tb0+iiyUEX
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 Design Science, Inc. 1990-2013
InternalName: Design Science situp Utility
FileVersion: 2013.2.5.0
CompanyName: D esign Science, Inc.
LegalTrademarks: Design Science situp Utility is a trademark of Design Science, Inc.
ProductName: Design Science situp Utility
ProductVersion: 6.9 (13020500)
FileDescription: De sign Science situp Utility
OriginalFilename: situp.EXE
Translation: 0x0409 0x04e4

Trojan-Ransom.Win32.Zerber.fjzj also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 005224381 )
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
CAT-QuickHealRansom.Cerber.G4
ALYacTrojan.Ransom.Cerber.1
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.4086
SangforRansom.Win32.Cerber_55.se
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaRansom:Win32/Zerber.b168d52f
K7GWTrojan ( 005224381 )
Cybereasonmalicious.19cd20
BaiduWin32.Trojan.Kryptik.alf
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.FZXM
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Cerber-7135781-0
KasperskyTrojan-Ransom.Win32.Zerber.fjzj
BitDefenderTrojan.Ransom.Cerber.1
NANO-AntivirusTrojan.Win32.Kryptik.evihkb
MicroWorld-eScanTrojan.Ransom.Cerber.1
TencentMalware.Win32.Gencirc.10baa93c
Ad-AwareTrojan.Ransom.Cerber.1
SophosMal/Generic-S + Mal/Cerber-AK
ComodoTrojWare.Win32.Kryptik.FBWM@6gt9t1
BitDefenderThetaGen:NN.ZexaF.34608.rq0@ai0mEFgi
VIPRETrojan.Win32.Generic.pak!cobra
TrendMicroRansom_CERBER.SMFE
McAfee-GW-EditionBehavesLike.Win32.Emotet.dm
FireEyeGeneric.mg.a3f3e9019cd20769
EmsisoftTrojan.Ransom.Cerber.1 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/Crypt.ZPACK.Gen
eGambitUnsafe.AI_Score_87%
MicrosoftTrojan:Win32/Dorv.C!rfn
ArcabitTrojan.Ransom.Cerber.1
AegisLabTrojan.Win32.Generic.4!c
ZoneAlarmTrojan-Ransom.Win32.Zerber.fjzj
GDataTrojan.Ransom.Cerber.1
AhnLab-V3Win-Trojan/Lukitus2.Exp
Acronissuspicious
McAfeeRansomware-GCQ!A3F3E9019CD2
MAXmalware (ai score=99)
VBA32Trojan-Ransom.Zerber
MalwarebytesRansom.Cerber
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_CERBER.SMFE
RisingRansom.Cerber!8.3058 (C64:YzY0OnPLY0DPFiLL)
YandexTrojan.GenAsa!HX73UwJBJ6Y
IkarusTrojan.Win32.Crypt
FortinetW32/Qbot.CQ!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cerber.HgIASOcA

How to remove Trojan-Ransom.Win32.Zerber.fjzj?

Trojan-Ransom.Win32.Zerber.fjzj removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment