Malware

Win32/Kryptik.HLSW information

Malware Removal

The Win32/Kryptik.HLSW is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HLSW virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (8 unique times)
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Serbian
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Network activity contains more than one unique useragent.
  • Creates a hidden or system file
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Uses suspicious command line tools or Windows utilities

Related domains:

g-partners.live
gcl-partners.in
iplogger.org
poloainstall.com
hofria09.top
telete.in
apps.identrust.com
closestep.top

How to determine Win32/Kryptik.HLSW?


File Info:

crc32: 5D4580A8
md5: 06e9f571f54e03012752ece2cb4cd2f3
name: 06E9F571F54E03012752ECE2CB4CD2F3.mlw
sha1: c4337bad2e8d4b19ca0469ad09d4a6fe7267491e
sha256: 7bc51b56522eae58b63b6bdd327afbd2b9589d55e631beaff1be7162f1c22f3c
sha512: 04807ce18af892f8e1e33f0eaae4f0276d07bc45d8c3c6fafefda27ca054867e82d61f34600bc9f1f92e5502c07ce1e4bb74f52bcbd27fafb3aa7599e1d98934
ssdeep: 3072:ED5WnVDDXGsHS0EyHFH+Cc1J5fOalAnnJpRgQdtEfWTWI3qA1TUasm0TkhuCQhb:EAV3GmEEFeCc1JAalAnJpk9I3qrmAbG
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: voygcuadage.exe
FileVersion: 1.7.39.18
Copyright: Copyrighz (C) 2020, wodkagudy
ProductVersions: 1.16.46
Translation: 0x0273 0x011e

Win32/Kryptik.HLSW also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005690671 )
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaMalware:Win32/km_24af8.None
K7GWTrojan ( 005690671 )
Cybereasonmalicious.d2e8d4
CyrenW32/Kryptik.EQG.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLSW
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
KasperskyUDS:DangerousObject.Multi.Generic
SophosMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Trojan.dc
FireEyeGeneric.mg.06e9f571f54e0301
EmsisoftTrojan.Crypt (A)
SentinelOneStatic AI – Malicious PE
MicrosoftTrojan:Win32/Sabsik.FL.A!ml
GridinsoftTrojan.Win32.Packed.lu!heur
GDataWin32.Trojan-Spy.BeamLoader.NWSVTE
Acronissuspicious
McAfeeArtemis!06E9F571F54E
VBA32BScope.Backdoor.Agent
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_GEN.R002H0CGG21
RisingMalware.Obscure!1.A3BB (CLASSIC)
IkarusVirus.Win32.Cryptor
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.ERHN!tr
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml
Qihoo-360HEUR/QVM10.1.9FFB.Malware.Gen

How to remove Win32/Kryptik.HLSW?

Win32/Kryptik.HLSW removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment