Home / Spyware Encyclopedia / Trojan.Win64.Miner.vho << Back

Recommendation to Automatically remove Trojan.Win64.Miner.vho


Our products can remove Trojan.Win64.Miner.vho and thousands of other Virus and Spyware automatically and instantly.

Trojan.Win64.Miner.vho Details


  • Category Trojan
  • Discovered 10/25/2024 4:25:49 PM
  • Modified 10/25/2024 5:51:41 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9958cd4c5d519b61b7594672e18f1532.exe 1411422  9958cd4c5d519b61b7594672e18f153214/11/2019
e4af2ca6aae2d9d3f38b7558a98c351c.exe 2990430  e4af2ca6aae2d9d3f38b7558a98c351c19/11/2019
20191118180109783984.exe 1392718  4cc06ff3f847d3b89d1214ab9a11244b21/11/2019
d7aef473522b0322efe9f90b49d9137d.exe 140288  d7aef473522b0322efe9f90b49d9137d13/06/2020
1062-570d83997b916f7e1e90770a55bb40a718031cb6.exe 416256  cc5218f9577b8304f880fe81d650b83903/12/2020
2aa9e9ddbf99f8aff54a3db95dabf490.vir.exe 416256  2aa9e9ddbf99f8aff54a3db95dabf49016/12/2020
7a6da2cef660a276aa9a6efee69ea4a41b3cf4fb08a433a04ff36e8ab7703fa2_sample.exe 8757264  70dbe7d2221fad2c9756dc17d11cb58704/02/2021
322d16bf96432609aa5b26a1c646be0384adf75114592e6caacaba7e3f8891c1_sample.exe 8349712  c63ce3fdc1b676fa4fdd8a2658d785b409/02/2021
cac7da94c5bde97df36d82a3e1565564.exe 1266176  cac7da94c5bde97df36d82a3e156556417/02/2021
12e67e94134e199c8d06847e4eecfa3dbbe1a926284b4119bb879c304a8ceb94_sample.exe 8759312  016d6b402dabe52c3e67b72ff966ae1b20/02/2021

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware