Home / Spyware Encyclopedia / Trojan.Win64.Miner.vho << Back

Recommendation to Automatically remove Trojan.Win64.Miner.vho


Our products can remove Trojan.Win64.Miner.vho and thousands of other Virus and Spyware automatically and instantly.

Trojan.Win64.Miner.vho Details


  • Category Trojan
  • Discovered 10/25/2024 4:25:49 PM
  • Modified 10/25/2024 5:51:41 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9958cd4c5d519b61b7594672e18f1532.exe 1411422  9958cd4c5d519b61b7594672e18f153214/11/2019
c21b3de946ad6fdacee59e67394e3e0c.exe 1305470  c21b3de946ad6fdacee59e67394e3e0c14/11/2019
56e6481692e741e37a59ed9055b4a604.exe 862848www.adobe.com2.16.0-beta56e6481692e741e37a59ed9055b4a60427/11/2019
20191212001228960674.exe 3039102  2923df1f889801f96dce3ef562a69e3713/12/2019
bf107954cd8f6b8335f9cdcfc951ceb0.vir.exe 1085440  bf107954cd8f6b8335f9cdcfc951ceb016/07/2020
1c434b8c86a2962244011bbf94bbd85c.exe 1313646  1c434b8c86a2962244011bbf94bbd85c14/08/2020
32b414a63ab87d19f893c08173ea2cbd.exe 1260032  32b414a63ab87d19f893c08173ea2cbd27/08/2020
708fb570a3e22fc5a2f3fbef3b37098d.exe 3937550  708fb570a3e22fc5a2f3fbef3b37098d08/10/2020
4f253c7bd12d49474e29f528589227df.exe 4427472  4f253c7bd12d49474e29f528589227df25/12/2020
4a5b1a05b2747e2c0d8c70da7900e09b2af997db5c447dff8c614eaf50c91e85_sample.exe 4520260  1b047a8d5a7bbc9d0f1b6d22469a5e7526/12/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware