Malware

Win32/Kryptik.HONX removal instruction

Malware Removal

The Win32/Kryptik.HONX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Kryptik.HONX virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid

How to determine Win32/Kryptik.HONX?


File Info:

name: C83335DC92D1CCE30F72.mlw
path: /opt/CAPEv2/storage/binaries/8353b4f27d55239e6935b1c122da96621ee66b0915750ed9b0b5a0b50f1d9b0d
crc32: 35FDF8DE
md5: c83335dc92d1cce30f72544c66ded1e1
sha1: c6e349057748fa3dd246ac7dc72a6d030070b788
sha256: 8353b4f27d55239e6935b1c122da96621ee66b0915750ed9b0b5a0b50f1d9b0d
sha512: 3134705dcc8ee9dd776f489760f45a0ab6f6766bdeb82d420c3d1b6c4107d23aa4eb0c3da57df1922eeb69430bf2efc413c81684523c634957d7e7cf9a5174f2
ssdeep: 6144:jQcefSV6H5ICVuOOLJ7ITsqxeigakL/B:jQcefSVJxLJ7uTa
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C464BEE236418731C0473E318426CFA0596FAC21D6609A07F7B77BAE6E763D012A674F
sha3_384: 2ebba8e48a7742b77aedc34caf74871610179826ccaee0b85e2fe2b4eb0a1b3cfb11dfb811e8cc1b493d92eb00d70ab3
ep_bytes: e805420000e978feffff8bff558bec51
timestamp: 2021-04-03 07:22:55

Version Info:

FileVersion: 21.79.127.9
InternationalName: povgwaoci.iwe
Copyrighz: Copyrighz (C) 2022, fuzkorta
Translations: 0x0124 0x010f

Win32/Kryptik.HONX also known as:

BkavW32.AIDetect.malware1
LionicHeuristic.File.Generic.00×1!p
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.84434
ClamAVWin.Malware.Filerepmalware-9940328-0
FireEyeGeneric.mg.c83335dc92d1cce3
CAT-QuickHealRansom.Stop.P5
ALYacTrojan.GenericKDZ.84434
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0058ee0a1 )
AlibabaRansom:Win32/StopCrypt.0e1b1e9c
K7GWTrojan ( 0058ee0a1 )
Cybereasonmalicious.57748f
CyrenW32/Kryptik.HKO.gen!Eldorado
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.HONX
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-Spy.Win32.Stealer.gen
BitDefenderTrojan.GenericKDZ.84434
NANO-AntivirusTrojan.Win32.jpbupz.jqjuai
SUPERAntiSpywareTrojan.Agent/Gen-Dropper
AvastWin32:AceCrypter-I [Cryp]
TencentTrojan.Win32.Mokes.xa
Ad-AwareTrojan.GenericKDZ.84434
EmsisoftTrojan.Crypt (A)
ComodoMalware@#9j540p69gh3c
DrWebTrojan.Siggen17.17616
VIPRETrojan.GenericKDZ.84434
TrendMicroTROJ_FRS.0NA103BS22
McAfee-GW-EditionPacked-GDT!C83335DC92D1
Trapminesuspicious.low.ml.score
SophosMal/Generic-S + Mal/Agent-AWV
SentinelOneStatic AI – Malicious PE
GDataTrojan.GenericKDZ.84434
JiangminTrojan.Stop.dlz
AviraTR/AD.GenSteal.fadvn
MAXmalware (ai score=85)
Antiy-AVLTrojan/Generic.ASMalwS.5E49
KingsoftWin32.Troj.Generic_a.a.(kcloud)
ArcabitTrojan.Generic.D149D2
MicrosoftRansom:Win32/StopCrypt.PAZ!MTB
GoogleDetected
AhnLab-V3Spyware/Win.BeamWinHTTP.R475178
Acronissuspicious
McAfeePacked-GDT!C83335DC92D1
VBA32BScope.Malware-Cryptor.Hlux
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_FRS.0NA103BS22
RisingTrojan.Kryptik!1.DC53 (CLASSIC)
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Packed.GEE!tr
AVGWin32:AceCrypter-I [Cryp]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Kryptik.HONX?

Win32/Kryptik.HONX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment