Malware

How to remove “Win32/Kryptik.HISC”?

Malware Removal

The Win32/Kryptik.HISC is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HISC virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Expresses interest in specific running processes
  • Unconventionial language used in binary resources: Macedonian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Win32/Kryptik.HISC?


File Info:

crc32: 84B9076D
md5: e329e689b7844628124c1ddc77bcadf0
name: E329E689B7844628124C1DDC77BCADF0.mlw
sha1: 8dd95e74bc19ce085e13487db36650615e6e4197
sha256: a720d83181a53a2f2792db5afb0485452f1e20970244ea0a6b4c529988774b16
sha512: 7975a5d9045bd838b67caaf6c192ece6ce717ecaa7471b96685a58721d2f50e924483b930dd0d5ee1ec6384ef8bf0a8e5772335b7052f81863cbe988acd6d489
ssdeep: 98304:5EEGapRtQJH4MHNl2JvWKZU7XP4grjTRIkhJjPaIcgwU8RbLTxilEEQN1OzzEtO:554VzT7XFn1JhJgTlMEPwtt+1vUryo8
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: vebug.ekzec
Prod: 1.2.5
FileVersions: 1.0.5.8
LegalCo: Copyri (C) 2019, permudationcy

Win32/Kryptik.HISC also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.36094143
FireEyeGeneric.mg.e329e689b7844628
McAfeeArtemis!E329E689B784
CylanceUnsafe
ZillyaTrojan.Zenpak.Win32.5460
AegisLabTrojan.Win32.Malicious.4!c
SangforMalware
K7AntiVirusTrojan ( 005761041 )
BitDefenderTrojan.GenericKD.36094143
K7GWTrojan ( 005761041 )
Cybereasonmalicious.4bc19c
CyrenW32/Trojan.QKKX-5614
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:BotX-gen [Trj]
KasperskyTrojan.Win32.Zenpak.bedo
AlibabaBackdoor:Win32/Glupteba.9c7356cc
RisingTrojan.Kryptik!8.8 (TFE:5:bdBbiCJIR3H)
Ad-AwareTrojan.GenericKD.36094143
SophosMal/Generic-S
ComodoMalware@#29yp7swjxg38b
F-SecureTrojan.TR/AD.GoCloudnet.bturj
DrWebTrojan.Siggen11.58181
VIPRETrojan.Win32.Generic!BT
TrendMicroTrojanSpy.Win32.ZENPACK.USMANAC21
McAfee-GW-EditionBehavesLike.Win32.Trojan.rc
EmsisoftTrojan.GenericKD.36094143 (B)
SentinelOneStatic AI – Suspicious PE
WebrootW32.Trojan.Gen
AviraTR/AD.GoCloudnet.bturj
MAXmalware (ai score=89)
MicrosoftTrojan:Win32/Glupteba.OB!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D226C0BF
ZoneAlarmTrojan.Win32.Zenpak.bedo
GDataTrojan.GenericKD.36094143
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R362922
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34780.@pGfa0r6U1cG
ALYacTrojan.GenericKD.36094143
VBA32Trojan.Zenpak
MalwarebytesTrojan.MalPack.GS
PandaTrj/RnkBend.A
ESET-NOD32a variant of Win32/Kryptik.HISC
TrendMicro-HouseCallTrojanSpy.Win32.ZENPACK.USMANAC21
TencentWin32.Trojan.Zenpak.Ahef
IkarusTrojan.MalPack
FortinetW32/Kryptik.HGHW!tr
AVGWin32:BotX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Generic/HEUR/QVM11.1.8E11.Malware.Gen

How to remove Win32/Kryptik.HISC?

Win32/Kryptik.HISC removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment