Home / Spyware Encyclopedia / Trojan.BHOLamp.ihf << Back

Recommendation to Automatically remove Trojan.BHOLamp.ihf


Our products can remove Trojan.BHOLamp.ihf and thousands of other Virus and Spyware automatically and instantly.

Trojan.BHOLamp.ihf Details


  • Category Trojan
  • Discovered 5/5/2016 3:38:03 PM
  • Modified 4/15/2024 11:13:25 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c240c25b64f58feb50201ec1359a436f19c16474.bin.dll 174080  af7459d437e5b935a023873c1afd96f8 
aacaf3d553288022fbb84d55ba76166e7b0db2cc687d4264d9299e27212f15f19ac765b12a5efab9acad44a2c45ac8fc1b41b7a6c172d678774c5270746f7eda.dll 175616  1e578f2ef5dfd31e2917f8284f2dab44 
2e4778c52120ec36ca2e67bdf38fea0b.dll 176128  2e4778c52120ec36ca2e67bdf38fea0b 
160602011968715f9a3ac9f611a207263812653bbbd28c6586b64cd0680dc8b4e0bb69e7fd1fd829a05eb9a9790c4.dll 547110  cb53369bac3f84007c4ca4fe5907372f 
e89e00052720fd4b0092c0bcd79fc9fb(1).dll 177664  e89e00052720fd4b0092c0bcd79fc9fb 
b660077e0bc76f8b1d626888dd24626e.dll 174080  b660077e0bc76f8b1d626888dd24626e 
1c8c9ae0169d208b485ac363e9ae6c2154fbec692439f016cfb7a767e6c5e670.dll 176640  15b7f1173ecca3bdb59d822c8d700f1b 
1a42736acd3a611abc5b9a0a4125a9dc91fdd528.bin.dll 178688  324f844efebcc0232960ae2e324bfd01 
6b2e71127d5f01c025d993dd34093db2.dll 173056  6b2e71127d5f01c025d993dd34093db2 
28f89b19b91307fa8af3d8d5e1802d80399dceb4.bin.dll 178176  5ba8feff7ba8d578a1ce9f357c5c7422 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware