Malware

What is “Win32/Kryptik.GWIM”?

Malware Removal

The Win32/Kryptik.GWIM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GWIM virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Attempts to delete volume shadow copies
  • Executed a process and injected code into it, probably while unpacking
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Kryptik.GWIM?


File Info:

crc32: 34D5E5FC
md5: 58b728556d76035f01c6e4283801aa10
name: 58B728556D76035F01C6E4283801AA10.mlw
sha1: 08bf1e78885302bfbade5f77cbb5afc43bbe14eb
sha256: fa2cb424a250afb6d0f60a0328f390757a56cd82a40b97092326d54a2cc805ab
sha512: 775cf3abe73043b43f60cc6f36f2413a9fcc0587e879d80c1208ae7f4e0abab1e147549736e2c73dcd803a6af3d5e6498a78ffc06c6556bc948bb79f0ffec641
ssdeep: 12288:QtKDK2J7QwCamnxZUt1Lh6cZjKVzgVFy08Fk+ooGU5Sc6UDx9djdp/b:Q0DK2dQwCf4gc0VzsF3UDb7R
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright 2015 Blueberry Consultants Ltd.
FileVersion: 3.4.7.5
CompanyName: Blueberry Consultants Ltd.
FileDescription: Imac Xmlfile
LegalTrademarks: Copyright 2015 Blueberry Consultants Ltd.
Comments: Imac Xmlfile
ProductName: Sports
ProductVersion: 3.4.7.5
PrivateBuild: 3.4.7.5
OriginalFilename: Sports.exe
Translation: 0x0409 0x04b0

Win32/Kryptik.GWIM also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005579ef1 )
Elasticmalicious (high confidence)
DrWebTrojan.Inject3.25537
CynetMalicious (score: 100)
ALYacTrojan.BrsecmonE.1
CylanceUnsafe
ZillyaTrojan.Foreign.Win32.59011
SangforTrojan.Win32.Save.a
AlibabaRansom:Win32/Foreign.56194abe
K7GWTrojan ( 005579ef1 )
Cybereasonmalicious.56d760
CyrenW32/Kryptik.AEE.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GWIM
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan-Ransom.Win32.Foreign.oijq
BitDefenderTrojan.BrsecmonE.1
NANO-AntivirusTrojan.Win32.Inject3.gaeeye
MicroWorld-eScanTrojan.BrsecmonE.1
TencentWin32.Trojan.Foreign.Sxyl
Ad-AwareTrojan.BrsecmonE.1
SophosMal/Generic-S
ComodoMalware@#1hltcg16nq4na
BitDefenderThetaGen:NN.ZexaF.34670.Tu0@aiT2Lqii
VIPRETrojan.Win32.Generic!BT
TrendMicroMal_HPGen-37b
McAfee-GW-EditionBehavesLike.Win32.Dropper.bc
FireEyeGeneric.mg.58b728556d76035f
EmsisoftTrojan.BrsecmonE.1 (B)
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1113279
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.BrsecmonE.1
AegisLabTrojan.Win32.Generic.4!c
ZoneAlarmTrojan-Ransom.Win32.Foreign.oijq
GDataTrojan.BrsecmonE.1
AhnLab-V3Malware/Win32.Hpgen.C3471029
McAfeeArtemis!58B728556D76
MAXmalware (ai score=84)
MalwarebytesRansom.Crysis
PandaTrj/CI.A
TrendMicro-HouseCallMal_HPGen-37b
RisingRansom.Foreign!8.292 (CLOUD)
IkarusTrojan-Ransom.GandCrab
MaxSecureTrojan.Malware.73761530.susgen
FortinetW32/Foreign.GWIM!tr.ransom
AVGWin32:Trojan-gen
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Foreign.HgIASOoA

How to remove Win32/Kryptik.GWIM?

Win32/Kryptik.GWIM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment