Trojan

Trojan.Heur.AutoIT.16 (B) malicious file

Malware Removal

The Trojan.Heur.AutoIT.16 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Heur.AutoIT.16 (B) virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Creates RWX memory
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Executed a process and injected code into it, probably while unpacking
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
rem-pounds.ddns.net

How to determine Trojan.Heur.AutoIT.16 (B)?


File Info:

crc32: 6E6777C1
md5: 535dab77878d1418e24312a7a5351a0e
name: 535DAB77878D1418E24312A7A5351A0E.mlw
sha1: 7555107a787f4e19cb4a46f8fc3616d94a6283ac
sha256: 1b6aa8727a5af92d9e4910d5bd7bd53e0c08f3c28f9e44ce8b3003bfac982ec4
sha512: 5c7063201ebdb66f54ea8ec4577016da03c486bc730095174d6ba881a6cb5d035a1961e4ce9bef3389017099a82190e608e3e8da7d8a87029c9427e24ae183c4
ssdeep: 24576:0A4AGWsNnHKWSligZExoMioemHaYfltk5Y:IAdFwxni5YaClUY
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: appsruprov
FileVersion: 539.779.771.83
CompanyName: SystemPropertiesProtection
ProductName: AppManagementConfiguration
ProductVersion: 58.935.541.746
FileDescription: vsjitdebugger
OriginalFilename: TpmInit
Translation: 0x0409 0x04b0

Trojan.Heur.AutoIT.16 (B) also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Inject4.4579
MicroWorld-eScanGen:Trojan.Heur.AutoIT.16
FireEyeGeneric.mg.535dab77878d1418
CAT-QuickHealBackdoor.AutoIt.Rescoms.C
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 700000111 )
BitDefenderGen:Trojan.Heur.AutoIT.16
K7GWTrojan ( 700000111 )
Cybereasonmalicious.7878d1
BitDefenderThetaAI:Packer.F34CB91817
CyrenW32/AutoIt.QF.gen!Eldorado
SymantecTrojan.Gen.2
AvastAutoIt:Injector-JF [Trj]
ClamAVWin.Malware.Nymeria-6993200-0
KasperskyTrojan.Script.Obit.gen
TencentMalware.Win32.Gencirc.10b639e7
Ad-AwareGen:Trojan.Heur.AutoIT.16
EmsisoftGen:Trojan.Heur.AutoIT.16 (B)
F-SecureHeuristic.HEUR/AGEN.1100064
InvinceaML/PE-A + Troj/AutoIt-DAW
McAfee-GW-EditionBehavesLike.Win32.TrojanAitInject.dh
SophosTroj/AutoIt-DAW
AviraHEUR/AGEN.1100064
Antiy-AVLGrayWare/Autoit.ShellCode.a
MicrosoftVirTool:Win32/AutInject.DE!bit
ArcabitTrojan.Heur.AutoIT.16
ZoneAlarmTrojan.Script.Obit.gen
GDataGen:Trojan.Heur.AutoIT.16
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Autoinj02.Exp
McAfeeArtemis!535DAB77878D
MAXmalware (ai score=88)
MalwarebytesBackdoor.Remcos
PandaTrj/Genetic.gen
APEXMalicious
ESET-NOD32a variant of Win32/Injector.Autoit.DZR
RisingTrojan.Injector/Autoit!1.BB8F (CLASSIC)
YandexTrojan.AvsArher.bS9LKk
IkarusTrojan.Autoit
MaxSecureTrojan.Malware.300983.susgen
FortinetAutoIt/Injector.EKY!tr
AVGAutoIt:Injector-JF [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360HEUR/QVM20.1.455B.Malware.Gen

How to remove Trojan.Heur.AutoIT.16 (B)?

Trojan.Heur.AutoIT.16 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment