Malware

Win32/Kryptik.EWAX removal

Malware Removal

The Win32/Kryptik.EWAX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.EWAX virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Kryptik.EWAX?


File Info:

crc32: 100F71A2
md5: bcc649516cd0cf27437e49571499f255
name: BCC649516CD0CF27437E49571499F255.mlw
sha1: 9d4fa377bea4de3da666a248bf9d7e1bbef0607e
sha256: 57a2d94bd7d0eb143a513c1a807c7cbf87cd3f37157722ce6273ed38903affd4
sha512: 745a3e32f7e6c61348ebe8d82415613db7b8da9739404256c2c83f7ecf8b6b8ba46653bbc8e1ecda61186783a4257707ed0d9d090ce057a56f918d8e5efa760d
ssdeep: 12288:d9L2AV1A3oQ73/6n62B9VxOIjKoa+888888888888W88888888888:dp2EFQr/66S9tuB
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

CompanyName: Ashampoo Development GmbH & Co. KG

Win32/Kryptik.EWAX also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005224381 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
CynetMalicious (score: 100)
CAT-QuickHealRansom.Cerber.A4
ALYacGen:Variant.Ransom.359
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.2687
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/generic.ali2000010
K7GWTrojan ( 005224381 )
Cybereasonmalicious.16cd0c
CyrenW32/Cerber.BF.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.EWAX
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Ransomware.Razy-6860532-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Ransom.359
NANO-AntivirusTrojan.Win32.Kryptik.eppfcn
MicroWorld-eScanGen:Variant.Ransom.359
TencentMalware.Win32.Gencirc.10b2a661
Ad-AwareGen:Variant.Ransom.359
SophosML/PE-A + Mal/Cerber-B
ComodoTrojWare.Win32.Ransom.Cerber.EW@73u1y1
BitDefenderThetaGen:NN.ZexaF.34628.Dq0@aGrVODhP
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPCERBER.SMALY5A
McAfee-GW-EditionRansomware-CBER!BCC649516CD0
FireEyeGeneric.mg.bcc649516cd0cf27
EmsisoftGen:Variant.Ransom.359 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Zerber.ciz
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1129194
eGambitUnsafe.AI_Score_99%
MicrosoftTrojan:Win32/Ymacco.AA57
ArcabitTrojan.Ransom.359
AegisLabTrojan.Win32.Zerber.j!c
GDataGen:Variant.Ransom.359
AhnLab-V3Win-Trojan/Cerber.Exp
Acronissuspicious
McAfeeRansomware-CBER!BCC649516CD0
MAXmalware (ai score=88)
VBA32BScope.Trojan.Azden
MalwarebytesCerber.Ransom.Encrypt.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_HPCERBER.SMALY5A
RisingTrojan.Kryptik!1.AB5A (CLOUD)
IkarusTrojan.Krypt
FortinetW32/Kryptik.HGZD!tr
AVGWin32:Trojan-gen
Qihoo-360Win32/Trojan.Generic.HxQBIW8A

How to remove Win32/Kryptik.EWAX?

Win32/Kryptik.EWAX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment