Trojan-Ransom.Win32.GenericCryptor.czn


Detection added: 15.05.2018 16:23:28
MD5: AF1CBAE45DFF87FED614E81E907AF610
SHA1: 5B01089003B332E5A48859795627D048FBE82EDF
Behavior: Trojan Program (Trojan Ransom)
The harmful program intended for unapproved user updating data on the computer-victim so that to make impossible work with them or block normal work of the computer. After the data (taken blocked), to the user the repayment demand is made.


Platform: This malware is the Portable Executable (PE) format (is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems).

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, Windows Vista, Windows 7 (x86/x64), Windows 8 (x86/x64), Windows 10 (x86/x64)

Generic Detection: Recognising unknown malware by its similarity to known items.
Generic Detections are a type of sophisticated detection used by antivirus programs to identify files with malicious characteristics. Items not identified exactly by means of a signature can sometimes be considered to be similar enough to a known item to merit an alert, and in many cases even a class identification.
Generic detection refers to the detection and removal of multiple threats using a single virus definition.

NOTE: The hash is only listed for the first detected malicious file. SHA/MD5 hash should not be intended as a security/antivirus solution, instead it provides you an additional information, allowing you to identify known malware files.
Learn more about:
 Latest threats
 Nicta Anti-Virus Engine (SDK)
 Anti-Malware Digital Patrol
 Anti-Virus Cloud Engine

Take the following steps to help prevent infection on your computer:
  • Use up-to-date antivirus software.
  • Get the latest updates for Operating system and your installed software.
  • Use strong passwords and password management software.
  • Use caution when opening attachments, accepting file transfers and clicking on links to webpages.