Malware

About “Win32/Kryptik.HCID” infection

Malware Removal

The Win32/Kryptik.HCID is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HCID virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • A process created a hidden window
  • Unconventionial language used in binary resources: Macedonian
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
onlynew.xyz

How to determine Win32/Kryptik.HCID?


File Info:

crc32: 39DA3174
md5: 0c156d8f2f00bfe4ec9f2b36d5bbda16
name: RTMD-an4vel7nggaavhwcaerffwaganx_tbya.exe
sha1: 3e4812004d44a7c88ba7d9553f7ae681c95a55dc
sha256: 46803fadf71fd3abc4f0d53cdc5873f915119e3ee288e4ef7a05243466ca7048
sha512: 773b4cbfcf2e3862f024d46ec1fcd24605668c30bcd2a62255e2453ead1aae5627e3edce00be440b3a54cdbd88a09f5030b692a6bf1d901558303f1ec5a60679
ssdeep: 49152:M23pKjo3LtL/vVz5jEsCBxtZpqaXWGlT6rjXEJnl64K0wiJZ4gm+AcQ28+iAI1w:J36uhL1zCBB1pjpWXEBl6wCpuXk
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Win32/Kryptik.HCID also known as:

BkavW32.AIDetectVM.malware
MicroWorld-eScanTrojan.GenericKD.33575830
FireEyeGeneric.mg.0c156d8f2f00bfe4
ALYacTrojan.GenericKD.33575830
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKD.33575830
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.04d44a
TrendMicroTROJ_GEN.R03FC0DCT20
CyrenW32/Trojan.GVBD-2180
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:CrypterX-gen [Trj]
KasperskyTrojan.Win32.Agentb.jxak
AlibabaTrojanPSW:Win32/Agentb.c98c208d
AegisLabTrojan.Win32.Malicious.4!c
TencentWin32.Trojan.Agentb.Eyf
Ad-AwareTrojan.GenericKD.33575830
SophosMal/RyPack-A
F-SecureTrojan.TR/AD.GoCloudnet.jrgx
DrWebTrojan.Siggen9.28447
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
FortinetPossibleThreat.MU
Trapminemalicious.high.ml.score
EmsisoftTrojan.GenericKD.33575830 (B)
IkarusTrojan.Crypt
JiangminTrojan.Generic.ectdd
WebrootW32.Trojan.Gen
AviraTR/AD.GoCloudnet.jrgx
eGambitUnsafe.AI_Score_99%
MAXmalware (ai score=84)
Antiy-AVLTrojan/Win32.Wacatac
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D2005396
ZoneAlarmTrojan.Win32.Agentb.jxak
MicrosoftPWS:Win32/Predator.KM!MTB
AhnLab-V3Trojan/Win32.MalPe.R330539
Acronissuspicious
McAfeeArtemis!0C156D8F2F00
MalwarebytesTrojan.MalPack.GS
PandaGeneric Malware
ESET-NOD32a variant of Win32/Kryptik.HCID
TrendMicro-HouseCallTROJ_GEN.R03FC0DCT20
RisingTrojan.Kryptik!8.8 (CLOUD)
SentinelOneDFI – Suspicious PE
MaxSecureTrojan.Malware.300983.susgen
GDataTrojan.GenericKD.33575830
BitDefenderThetaGen:NN.ZexaF.34104.ZtW@amBF4feG
AVGWin32:CrypterX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Generic/Trojan.160

How to remove Win32/Kryptik.HCID?

Win32/Kryptik.HCID removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment