Malware

Win32/Kryptik.VW removal guide

Malware Removal

The Win32/Kryptik.VW is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware - Review 2020

GridinSoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend to use GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the TRIAL period.
6-day free trial available.

What Win32/Kryptik.VW virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Win32/Kryptik.VW?


File Info:

name: 18537DB620065B09157F.mlw
path: /opt/CAPEv2/storage/binaries/e72fe9c7ee264c12d6ce242f8fad6289f0ba1ceb44526a1c0acf0be833d6a40f
crc32: 2B190632
md5: 18537db620065b09157f3b4934225164
sha1: 0b94afb7371981eae8a1c31e6cf561c8d22b957a
sha256: e72fe9c7ee264c12d6ce242f8fad6289f0ba1ceb44526a1c0acf0be833d6a40f
sha512: f973cdd9e1323a843b9e9eae22523023db55327aa37252b04be608e6798a14bb26ccead9005dc06c919ddfa608e69082408415f6782cec638d171e1ac832b389
ssdeep: 768:sKTgr5vXB45jYJyVhfpd++pCeS/TKvYm8gld7FM:s8yvR45ZD3pCzTKB/BM
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T122D2E19AD96CC0BBC4EFB4F08A5CBAF447DA96265B116580F325C4F572F74025A222C7
sha3_384: c1e52ece9cb52bc084d16b2d6b665355bfe737b2927ccc1eac21472800cc24688f307ce4033d9067ac95dce617c68714
ep_bytes: 60b1012c90954d424020c48350066e22
timestamp: 2009-06-12 08:01:37

Version Info:

0: [No Data]

Win32/Kryptik.VW also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Magania.kZ5I
tehtrisGeneric.Malware
MicroWorld-eScanGen:Trojan.Heur.bmY@HDRFf3c
ClamAVWin.Packed.Onlinegames-9781558-0
CAT-QuickHealTrojanPWS.Lolyda.Z2
McAfeegeneric!bg.ftt
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.620065
VirITTrojan.Win32.OLG.KE
CyrenW32/OnlineGames.CA.gen!Eldorado
SymantecInfostealer.Gampass
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win32/Kryptik.VW
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Trojan.Heur.bmY@HDRFf3c
NANO-AntivirusTrojan.Win32.Wsgame.ialq
AvastWin32:Agent-ACMH [Drp]
Ad-AwareGen:Trojan.Heur.bmY@HDRFf3c
EmsisoftGen:Trojan.Heur.bmY@HDRFf3c (B)
ComodoTrojWare.Win32.GameThief.Magania.~CF@1jnkvs
DrWebTrojan.PWS.Wsgame.12057
VIPREGen:Trojan.Heur.bmY@HDRFf3c
McAfee-GW-EditionBehavesLike.Win32.Generic.mc
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.18537db620065b09
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
GDataGen:Trojan.Heur.bmY@HDRFf3c
JiangminTrojan/PSW.Magania.abzt
AviraTR/Spy.Gen
Antiy-AVLTrojan/Generic.ASMalwS.76
ArcabitTrojan.Heur.EAE11E
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Trojan/Win32.OnlineGameHack.R2006
ALYacGen:Trojan.Heur.bmY@HDRFf3c
MAXmalware (ai score=82)
MalwarebytesMalware.Heuristic.1003
RisingTrojan.PSW.Win32.GameOnline.dvt (CLASSIC)
YandexTrojan.GenAsa!0IedP0WHKkw
IkarusTrojan.SuspectCRC
FortinetW32/OnlineGames.DRP!tr.pws
BitDefenderThetaAI:Packer.AFEB5C521B
AVGWin32:Agent-ACMH [Drp]
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Kryptik.VW?

Win32/Kryptik.VW removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment