Malware

What is “Win32/Kryptik.GYXM”?

Malware Removal

The Win32/Kryptik.GYXM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GYXM virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Win32/Kryptik.GYXM?


File Info:

crc32: DB6A5531
md5: 8733b3a896fe1ad747cf293a8a7c64a6
name: az.exe
sha1: 1f6891c333169b4272feb8e7444edd07ee9a0415
sha256: 6adbfaf2913d9c7c643ce8daf1e3ca84ba3c2eb7cedb565a0adb8117b9dcf0bc
sha512: 16127c277e41b43125722f38804222882062bbec060ebe07481f49cb21c80e0f21fb9b1f0a9b40f80a14c6871520515a9759a6944657fb884b0dbbe91ec0b5b8
ssdeep: 6144:54GIqqnx56x4f9TmI5lVITBqKqWdPxkX0CqVeej+hzLMKk8T/l5+:6bnf6yVT50TsKqiPxkkCqoWwk8T
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

fileversion: 67.80.26.594
companyname: Overflutter Paleocrystal Cyanophil
legaltrademarks: Snop Pervigilium
comments: Podvin
productname: Peroxids Ungraven Bushers
productversion: 71.79.56.41
filedescription: Athermic
originalfilename: Sedimenting Callousing
Translation: 0x0372 0x0000

Win32/Kryptik.GYXM also known as:

BkavW32.AIDetectVM.malware2
MicroWorld-eScanTrojan.GenericKD.32734924
FireEyeGeneric.mg.8733b3a896fe1ad7
ALYacSpyware.Infostealer.Azorult
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusTrojan ( 0055bea41 )
BitDefenderTrojan.GenericKD.32734924
K7GWTrojan ( 0055bea41 )
TrendMicroTROJ_GEN.R032C0PKM19
BitDefenderThetaGen:NN.ZexaF.34100.BuW@aeKiCudi
CyrenW32/Trojan.AOJC-8938
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GYXM
TrendMicro-HouseCallTROJ_GEN.R032C0PKM19
AvastWin32:Malware-gen
ClamAVWin.Trojan.Agent-7402256-0
GDataTrojan.GenericKD.32734924
KasperskyTrojan-PSW.Win32.Azorult.afvj
AlibabaTrojanPSW:Win32/Azorult.31e4d34f
NANO-AntivirusTrojan.Win32.Generic.giljlj
AegisLabTrojan.Win32.Azorult.i!c
APEXMalicious
TencentMalware.Win32.Gencirc.10b88c72
Ad-AwareTrojan.GenericKD.32734924
SophosMal/Generic-S
ComodoMalware@#1nqu8kaksaxa4
F-SecureTrojan.TR/AD.MoksSteal.eeaz
DrWebTrojan.PWS.Siggen2.39016
ZillyaTrojan.Azorult.Win32.4
Invinceaheuristic
McAfee-GW-EditionRDN/PWS-Banker
Trapminemalicious.high.ml.score
EmsisoftTrojan.GenericKD.32734924 (B)
SentinelOneDFI – Suspicious PE
JiangminTrojan.PSW.Azorult.ezo
MaxSecureTrojan.Malware.74705493.susgen
AviraTR/AD.MoksSteal.eeaz
MAXmalware (ai score=89)
Antiy-AVLTrojan[PSW]/Win32.Azorult
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1F37ECC
AhnLab-V3Malware/Win32.RL_Generic.R300642
ZoneAlarmTrojan-PSW.Win32.Azorult.afvj
MicrosoftTrojanSpy:Win32/Banload.AAA!rfn
Acronissuspicious
McAfeeRDN/PWS-Banker
VBA32BScope.TrojanPSW.Azorult
MalwarebytesSpyware.AzorUlt
PandaTrj/GdSda.A
RisingStealer.Azorult!8.11176 (CLOUD)
IkarusTrojan.Win32.Krypt
eGambitUnsafe.AI_Score_99%
FortinetW32/GenKryptik.DYEC!tr
WebrootW32.Trojan.Gen
AVGWin32:Malware-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)
Qihoo-360Trojan.Generic

How to remove Win32/Kryptik.GYXM?

Win32/Kryptik.GYXM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment