Malware

Win32/Injector.Autoit.EOI removal

Malware Removal

The Win32/Injector.Autoit.EOI file is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

What Win32/Injector.Autoit.EOI virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Anomalous binary characteristics

How to determine Win32/Injector.Autoit.EOI?


General:

Operating System: Windows 7 / 8 / 8.1 / 10 Virus Name: heuristic

File Info:

Name: home-crypt.exe

Size: 1084416

Type: PE32 executable (GUI) Intel 80386, for MS Windows

MD5: 52bf9330958ee840688a8a111750dfce

SHA1: 0e61a62adc5e6d27dd7ee0fc0737eca0a9a207bc

SH256: 69edd81ff82307c8ace08a6b3173da698b521da56d96aa5d1b2487ec58b04f18

Version Info:

[No Data]

Win32/Injector.Autoit.EOI also known as:

APEXMalicious
AhnLab-V3Win-Trojan/Autoinj03.Exp
Antiy-AVLTrojan/Generic.ASVCS3S.1E5
CrowdStrikewin/malicious_confidence_60% (W)
Cybereasonmalicious.adc5e6
ESET-NOD32a variant of Win32/Injector.Autoit.EOI
Endgamemalicious (high confidence)
FireEyeGeneric.mg.52bf9330958ee840
FortinetAutoIt/Inject.EJY!tr
Invinceaheuristic
MaxSecureTrojan.Malware.300983.susgen
McAfeeTrojan-AitInject.aq
McAfee-GW-EditionBehavesLike.Win32.Downloader.th
MicrosoftTrojan:Win32/Wacatac.B!ml
Paloaltogeneric.ml
Qihoo-360HEUR/QVM10.1.2681.Malware.Gen
RisingTrojan.Obfus/Autoit!1.BD7E (CLASSIC)
TrendMicro-HouseCallTROJ_GEN.R020H06KA19

How to remove Win32/Injector.Autoit.EOI?

Win32/Injector.Autoit.EOI removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment