Malware

Win32/Kryptik.GBFY removal tips

Malware Removal

The Win32/Kryptik.GBFY is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GBFY virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Win32/Kryptik.GBFY?


File Info:

crc32: ECC77F4E
md5: 596961e9b30b0433ed71ed32546104b2
name: 596961E9B30B0433ED71ED32546104B2.mlw
sha1: 883529d5f9dc92875f86fe5c8831da0fdeeac36f
sha256: b78a9b37b97070b2859a0e26ee07191812584a5809ff78e1ce3505cd9fa446cd
sha512: 84498bcff1fb29dd3c31bb195098236b34d4bfa6de5f1689bd394420750eda472dfef31aae9089bac93875514b76ac745614d206ee4d5e5ff05ce54514d8f59e
ssdeep: 6144:5b/jL3OWfrpjI0UbXNeICLEFCShwl5PGppa8Y:5bfOWf5U7NeIK7RGLFY
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2017, ertyertuert
FileVersion: 11.0.0.1
ProductVersion: 11.0.0.1
Translation: 0x0809 0x04b0

Win32/Kryptik.GBFY also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0053305e1 )
Elasticmalicious (high confidence)
DrWebTrojan.MulDrop7.55296
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Chapak.ZZ6
ALYacTrojan.BRMon.Gen.4
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/Gandcrab.58871feb
K7GWTrojan ( 005217df1 )
Cybereasonmalicious.9b30b0
CyrenW32/Ransom.IV.gen!Eldorado
SymantecPacked.Generic.525
ESET-NOD32a variant of Win32/Kryptik.GBFY
APEXMalicious
AvastFileRepMalware
ClamAVWin.Packer.Crypter-6539596-1
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.BRMon.Gen.4
NANO-AntivirusRiskware.Win32.BitCoinMiner.ewjchv
ViRobotTrojan.Win32.U.Ransom.187392
SUPERAntiSpywareTrojan.Agent/Gen-Bunitu
MicroWorld-eScanTrojan.BRMon.Gen.4
TencentMalware.Win32.Gencirc.114946bc
Ad-AwareTrojan.BRMon.Gen.4
SophosMal/Generic-R + Mal/GandCrab-D
ComodoTrojWare.Win32.Crypt.CE@7j06ca
BitDefenderThetaGen:NN.ZexaF.34688.ou0@aKLOQGm
VIPRETrojan.Win32.Generic!BT
TrendMicroTSPY_EMOTET.SMD3
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
FireEyeGeneric.mg.596961e9b30b0433
EmsisoftTrojan.BRMon.Gen.4 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Scar.kzg
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1106533
eGambitUnsafe.AI_Score_96%
Antiy-AVLTrojan/Generic.ASMalwS.2503FEE
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftRansom:Win32/Gandcrab.SF!MTB
ArcabitTrojan.BRMon.Gen.4
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.BRMon.Gen.4
AhnLab-V3Win-Trojan/MalPe34.Suspicious.X2029
Acronissuspicious
McAfeeGenericRXIN-CS!596961E9B30B
MAXmalware (ai score=100)
VBA32Trojan-Ransom.Blocker
MalwarebytesTrojan.MalPack
PandaTrj/Genetic.gen
TrendMicro-HouseCallTSPY_EMOTET.SMD3
RisingMalware.Obscure/Heur!1.A89E (CLOUD)
YandexTrojan.GenAsa!J8JxQMXS33Y
IkarusTrojan.Win32.Crypt
FortinetW32/GenKryptik.CNAR!tr
AVGFileRepMalware
Paloaltogeneric.ml

How to remove Win32/Kryptik.GBFY?

Win32/Kryptik.GBFY removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment