Trojan

Should I remove “Trojan:Win32/CryptInject.PVK!MTB”?

Malware Removal

The Trojan:Win32/CryptInject.PVK!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/CryptInject.PVK!MTB virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • The binary likely contains encrypted or compressed data.
  • Network activity detected but not expressed in API logs
  • Attempts to identify installed AV products by installation directory
  • Anomalous binary characteristics

How to determine Trojan:Win32/CryptInject.PVK!MTB?


File Info:

crc32: DA896BD6
md5: 6b1d665722f3c8b428c03cfa640f28b2
name: forza-horizon-3-aeda75.exe
sha1: e993f652b1a5b18e1916bf0825df4f8d4147a6f8
sha256: e481ffed2429f4a61c67f62f8663e47a5bd1c4fd205e7e973133adab298f57e8
sha512: 7332f72371c94f95f228203330b644f10b807f1784e85932bed5a1f6dfeb06ca583270969c980305b241cafe01876eea10d469b04af827f7eca4ea880cef50b5
ssdeep: 98304:NxJ4Fnb2W3jjffXs7QfgsP88xLFWSqoCrNQ7rc:NHQnb2W33ns7AvZk3NR
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: NCH Software
InternalName: ExpressBurn
FileVersion: 7.10+
CompanyName: NCH Software
ProductName: ExpressBurn
ProductVersion: 7.10+
FileDescription: Express Burn Disc Burning Software
OriginalFilename: ExpressBurn.exe
Translation: 0x0c09 0x04b0

Trojan:Win32/CryptInject.PVK!MTB also known as:

MicroWorld-eScanGen:Variant.Ulise.84883
CAT-QuickHealTrojan.EkstakPMF.S8877173
McAfeeArtemis!6B1D665722F3
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Ekstak.4!c
CrowdStrikewin/malicious_confidence_60% (W)
BitDefenderGen:Variant.Ulise.84883
K7GWTrojan ( 0055aaa81 )
K7AntiVirusTrojan ( 0055aaa81 )
Invinceaheuristic
CyrenW32/Trojan.RTGF-3392
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
GDataGen:Variant.Ulise.84883
KasperskyHEUR:Trojan.Win32.Ekstak.pef
AlibabaTrojan:Win32/CryptInject.ad13d953
NANO-AntivirusTrojan.Win32.Ekstak.gfplhl
RisingTrojan.Kryptik!1.BE94 (CLASSIC)
Ad-AwareGen:Variant.Ulise.84883
SophosMal/Generic-S
ComodoMalware@#c600ljyb3lox
F-SecureTrojan.TR/Crypt.Agent.cyxmn
DrWebTrojan.Zadved.1610
ZillyaTrojan.Ekstak.Win32.38681
TrendMicroTROJ_GEN.R002C0DK619
McAfee-GW-EditionBehavesLike.Win32.ICLoader.rc
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Ulise.84883 (B)
IkarusTrojan.Win32.Crypt
JiangminTrojan.Ekstak.aqgj
AviraTR/Crypt.Agent.cyxmn
MAXmalware (ai score=80)
Antiy-AVLGrayWare/Win32.Kryptik.gwqs
Endgamemalicious (high confidence)
ArcabitTrojan.Ulise.D14B93
ZoneAlarmHEUR:Trojan.Win32.Ekstak.pef
MicrosoftTrojan:Win32/CryptInject.PVK!MTB
AhnLab-V3Malware/Win32.RL_Generic.R297025
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.33550.@x0@ayRDrxhm
ALYacGen:Variant.Ulise.84883
VBA32BScope.Trojan.Casur
MalwarebytesAdware.DownloadAssistant
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.GXVA
TrendMicro-HouseCallTROJ_GEN.R002C0DK619
YandexTrojan.Kryptik!ipJQVGxpPW0
MaxSecureTrojan.Malware.74629352.susgen
FortinetW32/Kryptik.GXTM!tr
AVGWin32:TrojanX-gen [Trj]
AvastWin32:TrojanX-gen [Trj]
Qihoo-360Win32/Trojan.cb2

How to remove Trojan:Win32/CryptInject.PVK!MTB?

Trojan:Win32/CryptInject.PVK!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment