Malware

Crypt.44 information

Malware Removal

The Crypt.44 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Crypt.44 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Checks for the presence of known windows from debuggers and forensic tools
  • Behavior consistent with a dropper attempting to download the next stage.
  • Exhibits behavior characteristic of Locky ransomware

How to determine Crypt.44?


File Info:

crc32: 3EE25C02
md5: baa6f26db31199ee037ef70e272faf23
name: BAA6F26DB31199EE037EF70E272FAF23.mlw
sha1: c3080c133698f08e3afd3ceffdc4225855a95171
sha256: 4e9df17a38c9d85be1b5e13c5c777d2575b71f8397b753fffc8ab81eda6d919c
sha512: f4a3fe84d5e21e01642bfb60899551a920d86fad5f14f1864a212df3937b196259051cb3b821a9450c71af1bbde807f8e8a8284d8ce5d97d9638e792adefc533
ssdeep: 6144:kLZglDuSfqBB2Zh6akQr+H7nuejQSrg4+I6J6IwvJesD7uSDAvQ:IglvqBB2Zh6auH7uYfrg4d6J6IMJeWtF
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9HAMSTERsoft . 1999 - 2014
CompanyName: HAMSTERsoft
ProductName: Mediated
ProductVersion: 4.7.1.9
FileDescription: Permanente Interleave Grats Dichotomy Lasted
OriginalFilename: Mediated
Translation: 0x0409 0x04b0

Crypt.44 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
FireEyeGeneric.mg.baa6f26db31199ee
McAfeeArtemis!BAA6F26DB311
CylanceUnsafe
ZillyaTrojan.GenKryptik.Win32.52950
AegisLabTrojan.Win32.Generic.4!c
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0056e9231 )
BitDefenderGen:Variant.Crypt.44
K7GWTrojan ( 0056e9231 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Malware-gen
CynetMalicious (score: 100)
KasperskyTrojan-Ransom.Win32.Cryptor.bnz
AlibabaRansom:Win32/Cryptor.22ba549b
NANO-AntivirusTrojan.Win32.Encoder.evqwtb
MicroWorld-eScanGen:Variant.Crypt.44
Ad-AwareGen:Variant.Crypt.44
EmsisoftGen:Variant.Crypt.44 (B)
ComodoMalware@#1a1b61ktp6rq5
F-SecureHeuristic.HEUR/AGEN.1101369
DrWebTrojan.Encoder.3976
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPLOCKY.SME
McAfee-GW-EditionBehavesLike.Win32.Downloader.fc
SophosMal/Generic-S
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1101369
MAXmalware (ai score=99)
Antiy-AVLTrojan[Ransom]/Win32.Cryptor
MicrosoftRansom:Win32/Locky
ArcabitTrojan.Crypt.44
ZoneAlarmTrojan-Ransom.Win32.Cryptor.bnz
GDataGen:Variant.Crypt.44
Acronissuspicious
VBA32TrojanRansom.Cryptor
ALYacGen:Variant.Crypt.44
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.ERCC
TrendMicro-HouseCallRansom_HPLOCKY.SME
RisingTrojan.Generic@ML.83 (RDMK:eLSBsXZ4u1fmPJX/dczUrg)
YandexTrojan.GenKryptik!8VYLJnPW4yg
IkarusTrojan-Ransom.Cryptor
eGambitUnsafe.AI_Score_99%
FortinetW32/Cryptor.BNZ!tr
BitDefenderThetaGen:NN.ZexaF.34590.wq0@aeycqTbi
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cryptor.HgIASOUA

How to remove Crypt.44?

Crypt.44 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment