Malware

Win32/Kryptik.HIKP removal instruction

Malware Removal

The Win32/Kryptik.HIKP is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HIKP virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Slovenian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Checks for the presence of known windows from debuggers and forensic tools
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics

Related domains:

iplogger.org
leatherbond.top
ip-api.com

How to determine Win32/Kryptik.HIKP?


File Info:

crc32: 89094E9D
md5: 96fd25d614d52e3d0750471f1ec23165
name: 96FD25D614D52E3D0750471F1EC23165.mlw
sha1: 5bdee179974ae831436f76e59f28e34afa96c5ad
sha256: 17232397f13b120797a8de3e1f20595288523169a493266b72041bfeef91dd5d
sha512: 91a1bef2fc2e8467b87401397a8967ff18fddd25b025ab18790ee65311d9e591006b0036307f14442787ac99ad8c9ca774d97c4e14bdbeb9862b4240e59bdfdd
ssdeep: 12288:wbDqTHTELlTLy0Um+Ax9bLF2BYMGQ59q8EterjBOX77tf3YYxzL4W8BDUg3clzB:qDqTH4LlGBAbLUua5FEtef2d/zxzs9u
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: rebound.exe
Product: 1.7.6
FileVersions: 1.0.5.4
LegalCo: Copyri (C) 2019, parritions
Translation: 0x5539 0x00fa

Win32/Kryptik.HIKP also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Carberp.2635
MicroWorld-eScanTrojan.GenericKD.45156401
FireEyeGeneric.mg.96fd25d614d52e3d
ALYacTrojan.GenericKD.45156401
MalwarebytesTrojan.MalPack.GS
SangforMalware
K7AntiVirusTrojan ( 0057541b1 )
BitDefenderTrojan.GenericKD.45156401
K7GWTrojan ( 0057541b1 )
Cybereasonmalicious.9974ae
BitDefenderThetaGen:NN.ZexaF.34700.QmGfaK13xAkc
CyrenW32/Trojan.EKYI-3428
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:PWSX-gen [Trj]
KasperskyTrojan-Spy.Win32.Stealer.vmf
AlibabaTrojanSpy:Win32/Stealer.bb67d099
ViRobotTrojan.Win32.Z.Kryptik.697856.BG
Ad-AwareTrojan.GenericKD.45156401
SophosMal/Generic-S
ComodoMalware@#2l3145xl5vvby
McAfee-GW-EditionBehavesLike.Win32.PWSBanker.jc
EmsisoftTrojan.Crypt (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojanSpy.Stealer.dki
WebrootW32.Trojan.Gen
AviraTR/AD.AHKInfoSteal.gzsbj
KingsoftWin32.Troj.Stealer.v.(kcloud)
MicrosoftTrojan:Win32/Azorult.FW!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D2B10831
ZoneAlarmTrojan-Spy.Win32.Stealer.vmf
GDataTrojan.GenericKD.45156401
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.RL_Kryptik.R360326
McAfeeRDN/RedLineStealer
VBA32BScope.Trojan.Injuke
CylanceUnsafe
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.HIKP
TencentWin32.Trojan-spy.Stealer.Hwmv
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.HFSR!tr
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Generic/HEUR/QVM11.1.27D4.Malware.Gen

How to remove Win32/Kryptik.HIKP?

Win32/Kryptik.HIKP removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment