Malware

Should I remove “Win32:Agent-IAT [Trj]”?

Malware Removal

The Win32:Agent-IAT [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Agent-IAT [Trj] virus can do?

  • At least one process apparently crashed during execution
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Installs itself for autorun at Windows startup

How to determine Win32:Agent-IAT [Trj]?


File Info:

name: 800CB99943652B015738.mlw
path: /opt/CAPEv2/storage/binaries/004b5f52b5c8a43d8a6012c1a1827b65c57671bb2dbfa1aee1920a7f153abeb2
crc32: D6D4D583
md5: 800cb99943652b0157385c159a3b36ac
sha1: d3bef955a0cdeeef8129b4a3acbad6c58e06213e
sha256: 004b5f52b5c8a43d8a6012c1a1827b65c57671bb2dbfa1aee1920a7f153abeb2
sha512: bb2da648d7f1966b3d61afa4899ef03774faa771df07789147bc9c82ea952391b12e2a60ac39d2464d6d798adf2703442eb24e460ac99ff87d527dc4a98b9d41
ssdeep: 1536:q5neEhlcTW5sk1jtf2XvWINndIcN6JDQs5g7j6tbsvf+4XCs03:Inj9jtfU+INndIc0Jt5io+1XCs03
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C5834A1297E4813BE0F537B049FE12632779BCE06B79A39F824954D95C717C0AA7832B
sha3_384: 00f84d49f0f001f5cd027eba2b2be31f803e6532ebb136cbe94bba3903d4a8aced69d417f8a56cee403f72990a9f4009
ep_bytes: e80a000000e97affffffcccccccccc8b
timestamp: 2004-08-04 06:01:37

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: WEXTRACT.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.00.2900.2180
Translation: 0x0409 0x04b0

Win32:Agent-IAT [Trj] also known as:

DrWebBackDoor.Beizhu.2077
MicroWorld-eScanTrojan.Delf.Inject.Z
FireEyeTrojan.Delf.Inject.Z
ALYacTrojan.Delf.Inject.Z
CylanceUnsafe
Cybereasonmalicious.943652
BitDefenderThetaAI:Packer.699B17281F
CyrenW32/DelfInject.A.gen!Eldorado
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.ErPack
ClamAVWin.Trojan.Agent-108147
KasperskyTrojan-Dropper.Win32.Delf.pz
BitDefenderTrojan.Delf.Inject.Z
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Agent-IAT [Trj]
Ad-AwareTrojan.Delf.Inject.Z
EmsisoftTrojan.Delf.Inject.Z (B)
ComodoBackdoor.Win32.Agent.~BAAQ@fy48
F-SecureTrojan.TR/Hijacker.Gen
McAfee-GW-EditionBehavesLike.Win32.PWSMmorpg.mh
SophosML/PE-A + Mal/Dropper-G
SentinelOneStatic AI – Malicious SFX
GDataTrojan.Delf.Inject.Z
JiangminTrojan/Chifrax.bse
WebrootTrojan.Dropper.Gen
AviraTR/Hijacker.Gen
MAXmalware (ai score=87)
ArcabitTrojan.Delf.Inject.Z
ZoneAlarmTrojan-Dropper.Win32.Delf.pz
MicrosoftBackdoor:Win32/Bladabindi!ml
CynetMalicious (score: 100)
McAfeeArtemis!800CB9994365
VBA32Malware-Dropper.Win32.ICrypt
MalwarebytesMalware.Heuristic.1001
APEXMalicious
RisingTrojan.Win32.Generic.13684163 (C64:YzY0Okq17K7IuDph)
YandexTrojan.GenAsa!ZPpJDROlT74
IkarusTrojan.Hijacker
FortinetW32/Injector.fam!tr
AVGWin32:Agent-IAT [Trj]

How to remove Win32:Agent-IAT [Trj]?

Win32:Agent-IAT [Trj] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment