Malware

About “Win32/Kryptik.GYXR” infection

Malware Removal

The Win32/Kryptik.GYXR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GYXR virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Collects information about installed applications
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
mm5132645.xyz

How to determine Win32/Kryptik.GYXR?


File Info:

crc32: E3D07771
md5: 1ed337ff14dedd669a98049547ab6de0
name: him.exe
sha1: bb8a557fb6ebda5814f655d6f3344eb3f25835b1
sha256: f12f75fd9ddd554bb57f0e831f9c9860804c06987f541d9a9fc5c2d90aff08a3
sha512: 568e997f24771ac63800ff7b1b448c9db261bde9f085840f7bc993a2e62d9097c0c13725bf9e154fbbff07d9726e93ddde804e4d0fde22b586894d5dff0eefc1
ssdeep: 6144:1+qI6YNg4T+bbquxO4cAOiwmp70yAVJuZjDQWh9Wq:1p4Td4cYwSmWjDhWq
type: PE32 executable (GUI) Intel 80386 system file, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.GYXR also known as:

MicroWorld-eScanTrojan.GenericKD.32767210
CAT-QuickHealRansom.Stop.MP4
McAfeeRDN/Generic.grp
ALYacTrojan.GenericKD.32767210
CylanceUnsafe
VIPRETrojan.FakeAlert
AegisLabTrojan.Win32.Azorult.i!c
SangforMalware
K7AntiVirusTrojan ( 0053d5971 )
BitDefenderTrojan.GenericKD.32767210
K7GWTrojan ( 0053d5971 )
Cybereasonmalicious.fb6ebd
F-ProtW32/FakeAlert.5!Maximus
SymantecML.Attribute.HighConfidence
APEXMalicious
GDataTrojan.GenericKD.32767210
KasperskyTrojan-PSW.Win32.Azorult.agkp
AlibabaTrojanPSW:Win32/Azorult.c2749999
ViRobotTrojan.Win32.Ransom.349184.B
RisingTrojan.Generic@ML.94 (RDMK:7z+s4CZizSyM9c9bsVOw6g)
Endgamemalicious (high confidence)
SophosMal/Generic-S
F-SecureTrojan.TR/AD.MoksSteal.efxv
DrWebTrojan.DownLoader30.29919
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.1ed337ff14dedd66
IkarusTrojan.Win32.Crypt
CyrenW32/FakeAlert.5!Maximus
JiangminTrojan.Generic.alpet
WebrootW32.Malware.Gen
AviraTR/AD.MoksSteal.efxv
MAXmalware (ai score=100)
ArcabitTrojan.Generic.D1F3FCEA
ZoneAlarmTrojan-PSW.Win32.Azorult.agkp
MicrosoftTrojan:Win32/Skeeyah.A!MTB
AhnLab-V3Trojan/Win32.RL_MalPe.R301428
Acronissuspicious
TACHYONTrojan-PWS/W32.Azorult.288768.D
Ad-AwareTrojan.GenericKD.32767210
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.GYXR
TrendMicro-HouseCallTROJ_GEN.R002C0WKT19
SentinelOneDFI – Malicious PE
FortinetW32/Kryptik.GYXK!tr
BitDefenderThetaGen:NN.ZexaF.32515.ryW@aCJdvuo
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)
Qihoo-360Win32/Trojan.PSW.028

How to remove Win32/Kryptik.GYXR?

Win32/Kryptik.GYXR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment