Malware

Win32/Kryptik.GZQW malicious file

Malware Removal

The Win32/Kryptik.GZQW is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.GZQW virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Attempts to remove evidence of file being downloaded from the Internet
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself

How to determine Win32/Kryptik.GZQW?


File Info:

crc32: 42B7A600
md5: 4e88335a52a02b2e33cd806b958fd0c4
name: Yh.exe
sha1: 28e6cf035d70b41d14635bafe76940007ee18ff2
sha256: 9731d157891d7efcaba7ddff69e624f1bbd58679046b5c3610a3fed14a0c9137
sha512: 2aba891af015f96a90f1099385f5cc4a7c886b0d03281228de1d56833f27abae37a8eef62ab83726286b47e013b34ffbe1b4ea2b41606cff7b7976da0c17f5be
ssdeep: 6144:BoZPIjDRcA0lMq7UtVYe6ciL026uCHgUexyHvolUAfbzfCAjfZcyepWitV:BoZMDRN17tVQLOAgkVcyeQ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2002
InternalName: MCIWndWrapper
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: MCIWndWrapper Application
ProductVersion: 1, 0, 0, 1
FileDescription: MCIWndWrapper MFC Application
OriginalFilename: MCIWndWrapper.EXE
Translation: 0x0409 0x04b0

Win32/Kryptik.GZQW also known as:

MicroWorld-eScanTrojan.GenericKD.42136462
McAfeeRDN/Emotet-Dropped
VIPRETrojan.Win32.Generic!BT
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKD.42136462
K7GWRiskware ( 0040eff71 )
CyrenW32/Emotet.ADV.gen!Eldorado
SymantecTrojan Horse
ESET-NOD32a variant of Win32/Kryptik.GZQW
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Dropper.Emotet-7465502-0
KasperskyTrojan-Banker.Win32.Emotet.eofv
ViRobotTrojan.Win32.Emotet.667848
Ad-AwareTrojan.GenericKD.42136462
EmsisoftTrojan.GenericKD.42136462 (B)
ComodoMalware@#24wioyyvd46zo
F-SecureTrojan.TR/AD.Emotet.qngah
DrWebTrojan.Emotet.762
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Dropper.jm
Trapminesuspicious.low.ml.score
FireEyeTrojan.GenericKD.42136462
SophosMal/Generic-S
SentinelOneDFI – Suspicious PE
F-ProtW32/Emotet.ADV.gen!Eldorado
WebrootW32.Trojan.Gen
AviraTR/AD.Emotet.qngah
FortinetW32/GenKryptik.DYLZ!tr
ArcabitTrojan.Generic.D282F38E
ZoneAlarmTrojan-Banker.Win32.Emotet.eofv
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
AhnLab-V3Malware/Win32.Generic.C3653050
Acronissuspicious
VBA32BScope.TrojanPSW.Spy
MalwarebytesTrojan.Agent
PandaTrj/Emotet.A
IkarusTrojan.Win32.Krypt
GDataTrojan.GenericKD.42136462
AVGFileRepMalware
AvastFileRepMalware
CrowdStrikewin/malicious_confidence_60% (W)
Qihoo-360HEUR/QVM08.0.02AB.Malware.Gen

How to remove Win32/Kryptik.GZQW?

Win32/Kryptik.GZQW removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment