Malware

Win32/Kryptik.DCVG removal

Malware Removal

The Win32/Kryptik.DCVG is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.DCVG virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to remove evidence of file being downloaded from the Internet
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to stop active services
  • Installs itself for autorun at Windows startup
  • Attempts to modify browser security settings
  • Attempts to disable UAC
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Attempts to modify user notification settings

Related domains:

immidiatesomorathes.com
wunemeches.com
immidiationsoftuptes.com

How to determine Win32/Kryptik.DCVG?


File Info:

crc32: D68FCB20
md5: f5418a9727e4441928e39cf7766d6310
name: F5418A9727E4441928E39CF7766D6310.mlw
sha1: bc614abd0fdc21bc6a5099b4bb160ca712d4cbf8
sha256: 20d18cf90373d7b2ec15bae42542fd1378e6e388d08e626af13440f1d7380a5e
sha512: 6174ff2bdd17f80c75b372eb0ccd261981bd7885a6819951f305d56fbe666cc5d1e86f1ba82f843042bda5df020028108c4635bc5ca5f6e3995a9810b8cbdf59
ssdeep: 12288:cIG0jdh1/dYODk0dlLVjGio9hQiHrKD7jKOFLuKR0qPrl:vdD/WODNpFTiWmBKRPPB
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB) system file, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2008 - 2015
InternalName: FormatFactory
FileVersion: 3.6.0.0
CompanyName: Free Time
Comments: http://www.pcfreetime.com
ProductName: FormatFactory
ProductVersion: 3.6.0.0
FileDescription: FormatFactory
OriginalFilename: FormatFactory.exe
Translation: 0x0409 0x04b0

Win32/Kryptik.DCVG also known as:

Elasticmalicious (high confidence)
DrWebBackDoor.Anunak.145
MicroWorld-eScanGen:Variant.Symmi.94128
CAT-QuickHealTrojan.Generic.B4
ALYacGen:Variant.Symmi.94128
ZillyaTrojan.Yakes.Win32.68223
Cybereasonmalicious.727e44
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.DCVG
APEXMalicious
AvastFileRepMalware
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Yakes.wbmf
BitDefenderGen:Variant.Symmi.94128
NANO-AntivirusTrojan.Win32.Yakes.ezlynn
TencentWin32.Trojan.Yakes.Ebpx
Ad-AwareGen:Variant.Symmi.94128
SophosMal/Generic-S
ComodoMalware@#3b0966hldgnxu
BitDefenderThetaGen:NN.ZexaF.34294.Hq0@aKkF1Ufi
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Dropper.hc
FireEyeGeneric.mg.f5418a9727e44419
EmsisoftGen:Variant.Symmi.94128 (B)
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1113273
Antiy-AVLTrojan/Generic.ASMalwS.253C1C3
MicrosoftTrojanDropper:Win32/Evotob.B
GDataGen:Variant.Symmi.94128
AhnLab-V3Trojan/Win32.ZBot.R139997
Acronissuspicious
McAfeeArtemis!F5418A9727E4
MAXmalware (ai score=98)
VBA32BScope.Trojan.Injector
PandaTrj/GdSda.A
RisingTrojan.Generic@ML.100 (RDML:0AbYp2wTLDm0P+sAHuxrRA)
YandexTrojan.Yakes!DmEL54NjKtg
FortinetW32/Kryptik.DCVG!tr
AVGFileRepMalware
Paloaltogeneric.ml

How to remove Win32/Kryptik.DCVG?

Win32/Kryptik.DCVG removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment