Malware

Win32/Kryptik.GYXQ information

Malware Removal

The Win32/Kryptik.GYXQ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GYXQ virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Detected script timer window indicative of sleep style evasion
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Network activity contains more than one unique useragent.
  • Attempts to modify proxy settings
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
gg-clean.hk
a.tomx.xyz
iplogger.org
apps.identrust.com

How to determine Win32/Kryptik.GYXQ?


File Info:

crc32: 16EC3716
md5: ab6c0b43d94803323a004aea7b01e14f
name: kiskis.exe
sha1: 964aca23cc39f72b6ed1dcba841f5e5d94a8979b
sha256: 876163a2122920b3b1b323d952fbbf92b45bfafb27d4c194aa9ad4bb7dbc98cf
sha512: 693ad3401e77908c90a883a3dfd0a7db00b2362c73f1d2dc3477fff5380e1f83f1162b35fe9ba0ee59778980bd290134f313c690ae7191fd3d9d861367e5fcb6
ssdeep: 6144:eMTzAx45ieMq25FCcAOH2foRnZj8cJAppamQ5yPfKUxf8GFG1dowqXWq:ez45/bcJ9RZoYfMf75YKdWq
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GYXQ also known as:

MicroWorld-eScanTrojan.GenericKD.42071027
FireEyeGeneric.mg.ab6c0b43d9480332
McAfeeW32/Etap.a.gen
MalwarebytesTrojan.MalPack.GS
VIPRETrojan.FakeAlert
SangforMalware
K7AntiVirusTrojan ( 0053d5971 )
BitDefenderTrojan.GenericKD.42071027
K7GWTrojan ( 0053d5971 )
CrowdStrikewin/malicious_confidence_100% (W)
Invinceaheuristic
F-ProtW32/FakeAlert.5!Maximus
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
GDataWin32.Trojan.Agent.64HIEB
KasperskyTrojan-Downloader.Win32.Upatre.ihda
ViRobotTrojan.Win32.Ransom.349184.B
RisingDownloader.Dofoil!8.322 (TFE:5:6dqppqxCscG)
Ad-AwareTrojan.GenericKD.42071027
F-SecureTrojan.TR/AD.Chapak.domk
McAfee-GW-EditionBehavesLike.Win32.Generic.fc
Trapminesuspicious.low.ml.score
SentinelOneDFI – Malicious PE
CyrenW32/FakeAlert.5!Maximus
JiangminTrojan.Generic.alpet
AviraTR/AD.Chapak.domk
MAXmalware (ai score=85)
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D281F3F3
ZoneAlarmTrojan-Downloader.Win32.Upatre.ihda
MicrosoftTrojan:Win32/Downloader.G!MTB
AhnLab-V3Trojan/Win32.RL_MalPe.R301428
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.32515.xyW@aeSQtPe
CylanceUnsafe
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.GYXQ
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GYXK!tr
AVGFileRepMetagen [Malware]
Cybereasonmalicious.3cc39f
Qihoo-360HEUR/QVM10.1.8CA3.Malware.Gen

How to remove Win32/Kryptik.GYXQ?

Win32/Kryptik.GYXQ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment