Malware

Win32/Kryptik.GESF removal guide

Malware Removal

The Win32/Kryptik.GESF is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GESF virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (5 unique times)
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Queries information on disks, possibly for anti-virtualization
  • Detects the presence of Wine emulator via registry key
  • Attempts to modify proxy settings
  • Attempts to create or modify system certificates
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
ec2-52-57-16-9.eu-central-1.compute.amazonaws.com
illumex.ai
apps.identrust.com
crl.identrust.com
x1.c.lencr.org
r3.o.lencr.org

How to determine Win32/Kryptik.GESF?


File Info:

crc32: AFB82C23
md5: c87fe019f2574740b001fe2563c5a3b6
name: C87FE019F2574740B001FE2563C5A3B6.mlw
sha1: 6989df6151b2bf49ee29a5cb5b6285dfd123a415
sha256: 1a5791cd0307d83ab41d28db00f017f8f7e21b572ee9f81f0289c96b41ea7353
sha512: 8d5545d65371d2e947eee05af5627736307f90f2acfcbccb285d3869c0e18e1cac5117107288aee757789cce3d8c4dd9a463eb67b1b72346ba5068a242c8c927
ssdeep: 49152:YfF93rqxx2VGL0Eh8WfATyvcO4z1Pq3eAQTjPw4:YfvGrFAGvcOuPq3eAIjI4
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GESF also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 00533b5a1 )
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3282
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Ekstak.A02
ALYacTrojan.Mint.Zamg.J
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7GWTrojan ( 0052b8be1 )
Cybereasonmalicious.9f2574
CyrenW32/Trojan.FSL.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GESF
ZonerProbably Heur.ExeHeaderH
APEXMalicious
AvastWin32:AdwareSig [Adw]
ClamAVWin.Dropper.Icloader-6553203-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Mint.Zamg.J
NANO-AntivirusTrojan.Win32.Ekstak.ezcaaq
MicroWorld-eScanTrojan.Mint.Zamg.J
TencentMalware.Win32.Gencirc.114cef24
Ad-AwareTrojan.Mint.Zamg.J
SophosMal/BadCert-Gen
ComodoApplication.Win32.ICLoader.GS@84429a
VIPRETrojan.Win32.Generic!BT
TrendMicroPUA.Win32.ICLOADER.SM
McAfee-GW-EditionPacked-VJ!C87FE019F257
FireEyeGeneric.mg.c87fe019f2574740
EmsisoftApplication.AdFile (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Ekstak.gvo
AviraADWARE/ICLoader.Gen7
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASMalwS.2515A54
MicrosoftPUADlManager:Win32/InstallCube
ZoneAlarmHEUR:Packed.Win32.Katusha.gen
GDataWin32.Application.ICLoader.F
AhnLab-V3PUP/Win32.ICLoader.R223184
Acronissuspicious
McAfeePacked-VJ!C87FE019F257
MAXmalware (ai score=95)
MalwarebytesAdware.InstallCube
PandaTrj/Genetic.gen
TrendMicro-HouseCallPUA.Win32.ICLOADER.SM
RisingTrojan.Kryptik!1.B0DE (CLASSIC)
YandexTrojan.GenAsa!BzXJu17GdtQ
IkarusPUA.FileTour
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:AdwareSig [Adw]
Paloaltogeneric.ml

How to remove Win32/Kryptik.GESF?

Win32/Kryptik.GESF removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment