Malware

Win32/Kryptik.HJYA removal instruction

Malware Removal

The Win32/Kryptik.HJYA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HJYA virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Starts servers listening on 127.0.0.1:29722
  • A process created a hidden window
  • Unconventionial language used in binary resources: Turkish
  • The binary likely contains encrypted or compressed data.
  • A scripting utility was executed
  • Steals private information from local Internet browsers
  • Attempts to execute a powershell command with suspicious parameter/s
  • Collects information about installed applications
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Win32/Kryptik.HJYA?


File Info:

crc32: 7550AC55
md5: 7f13f3e095040cef0eff64c612f49b86
name: 7F13F3E095040CEF0EFF64C612F49B86.mlw
sha1: 3d196c6b83095bab7fd12a16580de02f1cb6a5f6
sha256: 1deaa2ced38a5fc1d872a130786ffb81be38e3a144386fd0c4d2e8b1cf332940
sha512: a9b4a783b64f4ea0c469f95d5fe1310020d6a520a1faca2d1e1c7ed7b16cbdfe31b7e4c009f0c907af4669135a7afe30c187ccfb924fe6358fce3198ba6ab7c5
ssdeep: 98304:/AyNnxuPTpqTIHnwOL7N5w7gZM0h+GPSGbt9PsGyFeJmICU8JhUJEbtS0zRgMMM:/ASnxuPdq0HLvNS7gZM+9k1FvIdiSu/
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: calimatimodunador.exe
FileVersions: 7.0.2.54
LegalCopyrights: Vsekdar
ProductVersions: 7.0.21.45
Translation: 0x0129 0x04ea

Win32/Kryptik.HJYA also known as:

BkavW32.AIDetect.malware2
K7AntiVirusRiskware ( 0040eff71 )
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Siggen2.62683
CynetMalicious (score: 100)
ALYacGen:Variant.Midie.80001
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaTrojan:Win32/ArkeiStealer.bb45462b
K7GWRiskware ( 0040eff71 )
CyrenW32/Kryptik.DPT.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HJYA
APEXMalicious
AvastWin32:BotX-gen [Trj]
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderTrojan.GenericKD.45897935
MicroWorld-eScanTrojan.GenericKD.45897935
Ad-AwareTrojan.GenericKD.45897935
SophosGeneric PUA DN (PUA)
BitDefenderThetaGen:NN.ZexaF.34628.@x0@aG6CVQeG
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
FireEyeGeneric.mg.7f13f3e095040cef
EmsisoftTrojan.Crypt (A)
SentinelOneStatic AI – Malicious PE
AviraADWARE/Lollipop.Gen4
eGambitUnsafe.AI_Score_99%
MicrosoftTrojan:Win32/ArkeiStealer.RM!MTB
AegisLabRiskware.Win32.Generic.1!c
GDataTrojan.GenericKD.45897935
AhnLab-V3Trojan/Win32.GenericKDZ.R372538
Acronissuspicious
McAfeePacked-GDJ!7F13F3E09504
MAXmalware (ai score=81)
VBA32Trojan.Glupteba
MalwarebytesTrojan.MalPack.GS
RisingTrojan.GenKryptik!8.AA55 (RDMK:cmRtazoBz2BklLxLOEjml6HL046J)
AVGWin32:BotX-gen [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Adware.Generic.HwoC6FsA

How to remove Win32/Kryptik.HJYA?

Win32/Kryptik.HJYA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment