Malware

Win32/Kryptik.GHTS removal instruction

Malware Removal

The Win32/Kryptik.GHTS is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GHTS virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Behavior consistent with a dropper attempting to download the next stage.
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Collects information to fingerprint the system

Related domains:

ec2-18-184-82-137.eu-central-1.compute.amazonaws.com

How to determine Win32/Kryptik.GHTS?


File Info:

crc32: 2A89017A
md5: e4f2dc04f87d207a81900c9019e290c4
name: E4F2DC04F87D207A81900C9019E290C4.mlw
sha1: ab70954001aaf7b8c8636ee3c22308197d798645
sha256: 1db7fe499d0e3854fbf51da045e7111a0b269987f03005dde504d6af9fb1aab3
sha512: 9fa425eb831b8cb7b1cba7ae8318b1cb768baaeedc76448eb330b14334e4d558a0deace524f156b68207a95de0449feea0da351e5491890f528f27564d378331
ssdeep: 24576:9MpKDP5vaKETSWE1y733FyB9goti+VoRcrEEc9QiNUsfNwdrdoj6+SD:baWy73VyBM7dESvNBfNwdbt
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GHTS also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0053474a1 )
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3600
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Mauvaise.SL1
ALYacApplication.Bundler.ICLoader.4.Gen
CylanceUnsafe
ZillyaAdware.Generic.Win32.64301
CrowdStrikewin/malicious_confidence_60% (D)
AlibabaTrojan:Win32/Miner.161407ed
K7GWTrojan ( 0053474a1 )
Cybereasonmalicious.4f87d2
CyrenW32/Trojan.BKW.gen!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GHTS
APEXMalicious
AvastWin32:ICLoader-X [Adw]
Kasperskynot-a-virus:HEUR:AdWare.Win32.Generic
BitDefenderApplication.Bundler.ICLoader.4.Gen
NANO-AntivirusTrojan.Win32.InstallCube.febttb
MicroWorld-eScanApplication.Bundler.ICLoader.4.Gen
TencentMalware.Win32.Gencirc.10c9cf00
Ad-AwareApplication.Bundler.ICLoader.4.Gen
SophosGeneric PUA KL (PUA)
ComodoApplication.Win32.ICLoader.GS@84429a
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionPacked-VJ!E4F2DC04F87D
FireEyeGeneric.mg.e4f2dc04f87d207a
EmsisoftApplication.AdBundle (A)
SentinelOneStatic AI – Malicious PE
JiangminAdWare.Generic.okje
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASBOL.C4F9
MicrosoftSoftwareBundler:Win32/ICLoader
GDataWin32.Adware.ICLoader.E
AhnLab-V3PUP/Win32.ICLoader.R230182
Acronissuspicious
McAfeePacked-VJ!E4F2DC04F87D
MAXmalware (ai score=98)
VBA32Trojan.InstallCube
MalwarebytesAdware.InstallCube
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!t/XksjeCvGM
IkarusPUA.ICLoader
MaxSecurePacked.Packed.WIN32.Katusha.gen_211983
FortinetW32/Kryptik.GJNS!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Win32/Kryptik.GHTS?

Win32/Kryptik.GHTS removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment