Trojan

Trojan.Win32.Cryprar.aau removal instruction

Malware Removal

The Trojan.Win32.Cryprar.aau is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Cryprar.aau virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location
  • A script process created a new process
  • Appears to use command line obfuscation
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan.Win32.Cryprar.aau?


File Info:

name: 798523859F259247C0B3.mlw
path: /opt/CAPEv2/storage/binaries/853dd0549b1b0e312293c97513cc87f5cd8eb15e237e531d7f9ac30cd92c92fc
crc32: 4293F10C
md5: 798523859f259247c0b3dd39997dbc8c
sha1: 73fbd27d91ccdd322f8e1a96733a98dc467d5782
sha256: 853dd0549b1b0e312293c97513cc87f5cd8eb15e237e531d7f9ac30cd92c92fc
sha512: f1cc4b357ad80cacf5bd0181ae2ce42fa2135e53f9023da40c19622eefbaf99e58155b6f8647196e989bbcdd0da139125ff7759ac679fbdeb903f4f8bd6ea433
ssdeep: 24576:5HLmCiIhiXrQV/3dWoZLH8uSy1L3Y0jt98NoU2ykWpLU5iesVU8QOfPBs2PuV/:qs354G3lJ92JeWpqPJ3OBsei
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1EE551202B9D695B2E4320D352A79A7216D3E3C301F25DBDFA3E4592D9B321C17A34B63
sha3_384: d5bbb4d8eaa10755dbfc5dcf26cc2f1d22f9122fffe1d40697cee273d9307d79f228d085f476c3b00669336bb57b9ef1
ep_bytes: e884040000e988feffff3b0d68d64300
timestamp: 2020-06-25 10:38:24

Version Info:

0: [No Data]

Trojan.Win32.Cryprar.aau also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Cryprar.4!c
CynetMalicious (score: 99)
CAT-QuickHealTrojan.Cryprar
McAfeeArtemis!798523859F25
CylanceUnsafe
AlibabaTrojan:Win32/Cryprar.0adc7f25
K7GWTrojan ( 0057bde51 )
K7AntiVirusTrojan ( 0057bde51 )
SymantecTrojan.Gen.MBT
ESET-NOD32RAR/Agent.DJ
APEXMalicious
AvastSFX:Runner-C [Bd]
KasperskyTrojan.Win32.Cryprar.aau
BitDefenderTrojan.Ciusky.Gen.6
MicroWorld-eScanTrojan.Ciusky.Gen.6
RisingMalware.AbnormalScript/SFX!1.D9B9 (CLASSIC)
Ad-AwareTrojan.Ciusky.Gen.6
SophosGeneric ML PUA (PUA)
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FireEyeGeneric.mg.798523859f259247
EmsisoftTrojan.Ciusky.Gen.6 (B)
Paloaltogeneric.ml
GDataTrojan.Ciusky.Gen.6
WebrootW32.Trojan.Ciusky.Gen
AviraTR/Agent.pmqqp
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Ciusky.Gen.6
ViRobotTrojan.Win32.Z.Cryprar.1350439
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ALYacTrojan.Ciusky.Gen.6
VBA32Trojan.Cryprar
MalwarebytesTrojan.Dropper.VBS
ZonerProbably Heur.RARAutorun
TrendMicro-HouseCallTROJ_GEN.R002H0CL421
TencentWin32.Trojan.Cryprar.Ajbx
IkarusTrojan.Agent
MaxSecureWin.MxResIcn.Heur.Gen
AVGSFX:Runner-C [Bd]
PandaTrj/CI.A

How to remove Trojan.Win32.Cryprar.aau?

Trojan.Win32.Cryprar.aau removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment