Malware

Win32/Kryptik.GJJD removal instruction

Malware Removal

The Win32/Kryptik.GJJD is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GJJD virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Collects information to fingerprint the system

Related domains:

static.43.47.69.159.clients.your-server.de

How to determine Win32/Kryptik.GJJD?


File Info:

crc32: A09CA6FD
md5: 45b637d28677d88599090b4ac98fd5c0
name: 45B637D28677D88599090B4AC98FD5C0.mlw
sha1: f1f8e3b051930e1fbbd1c928ef3bdc400dcb4996
sha256: 1a62925ff1e4178627f1697af0273ec8697b47a0b1ff7606f8e1e163d42d942a
sha512: 6f2f906ad9df304bae2d1d108dc6254c9ac8f7670130f7f471c3ec9bd51c6d73bfe8ed50cf99c57991b2096f949378fa83bc3b7fe421f3b5b2fe101696d91ce3
ssdeep: 24576:p1yfZJQhFPO00Rq5u+Y+jfM8ut+OWyIyQa8HXMYT4gaTgqc3:iXQnP6z+jM8gH988YT4gR3
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GJJD also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00535dd71 )
Elasticmalicious (high confidence)
DrWebTrojan.Moneyinst.638
CynetMalicious (score: 100)
CAT-QuickHealPUA.IcloaderPMF.S17962897
ALYacApplication.Bundler.ICLoader.4.Gen
ZillyaTrojan.Generic.Win32.96231
SangforVirus.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojan:Win32/Katusha.06513598
K7GWTrojan ( 00535dd71 )
Cybereasonmalicious.28677d
CyrenW32/Kryptik.HI.gen!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GJJD
APEXMalicious
AvastWin32:AdwareSig [Adw]
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderApplication.Bundler.ICLoader.4.Gen
NANO-AntivirusTrojan.Win32.Ekstak.fhmhuf
MicroWorld-eScanApplication.Bundler.ICLoader.4.Gen
TencentTrojan.Win32.Kryptik.gjbs
Ad-AwareApplication.Bundler.ICLoader.4.Gen
SophosMal/Generic-S
ComodoApplication.Win32.ICLoader.GS@84429a
TrendMicroPUA.Win32.ICLoader.SMA
McAfee-GW-EditionPacked-FHK!45B637D28677
FireEyeGeneric.mg.45b637d28677d885
EmsisoftApplication.fileTour (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Ekstak.cag
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASMalwS.2710513
MicrosoftSoftwareBundler:Win32/ICLoader
ZoneAlarmHEUR:Packed.Win32.Katusha.gen
GDataWin32.Application.ICLoader.F
AhnLab-V3PUP/Win32.ICLoader.R233328
Acronissuspicious
McAfeePacked-FHK!45B637D28677
MAXmalware (ai score=72)
VBA32BScope.Trojan.Moneyinst
MalwarebytesAdware.FileTour.BatBitRst
PandaTrj/Genetic.gen
TrendMicro-HouseCallPUA.Win32.ICLoader.SMA
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!0/GpQq3IgaE
IkarusTrojan.Win32.Krypt
MaxSecureTrojan.Packed.WIN32.Katusha.gen_216061
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:AdwareSig [Adw]
Paloaltogeneric.ml

How to remove Win32/Kryptik.GJJD?

Win32/Kryptik.GJJD removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment