Malware

About “Win32/Kryptik.GYUE” infection

Malware Removal

The Win32/Kryptik.GYUE is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

What Win32/Kryptik.GYUE virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • Drops a binary and executes it
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Creates a copy of itself

How to determine Win32/Kryptik.GYUE?


File Info:

crc32: C7FE77B4
md5: 8457930bd4d03e03ce2080e4da1e224d
name: gCn.exe
sha1: a7d5f868aede9d852c571c58fb2a58130d068bef
sha256: 6346fbe9dc994fd8a4d22a0efa8c51253781346dd0a097bb4651dcf3aa521332
sha512: a90673f0e8cffc9ce129062cc85d8c82a18b81a88e0581efefe1513df1dac8c54dd5d091614a5860b727620e1698f088c246cc733dd84fc22cddcdf9f7e7c805
ssdeep: 3072:nkc1g1wmoElSGphpwOz6fQork4W+DXXgczyU8P7GLpx415iQuoyGz3rI:nVy3oEllphr0zPDXXgcunP7GLpxXH2r
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GYUE also known as:

CylanceUnsafe
BitDefenderThetaGen:NN.ZexaF.32515.ouX@aKnThPni
F-ProtW32/Emotet.ACG.gen!Eldorado
APEXMalicious
Invinceaheuristic
FireEyeGeneric.mg.8457930bd4d03e03
CyrenW32/Emotet.ACG.gen!Eldorado
JiangminPack.Mal.AntiVM
Endgamemalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.GYUE
CrowdStrikewin/malicious_confidence_70% (D)

How to remove Win32/Kryptik.GYUE?

Win32/Kryptik.GYUE removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment