Home / Spyware Encyclopedia / Trojan.Win64.Miner.vho << Back

Recommendation to Automatically remove Trojan.Win64.Miner.vho


Our products can remove Trojan.Win64.Miner.vho and thousands of other Virus and Spyware automatically and instantly.

Trojan.Win64.Miner.vho Details


  • Category Trojan
  • Discovered 10/25/2024 4:25:49 PM
  • Modified 10/25/2024 5:51:41 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e4af2ca6aae2d9d3f38b7558a98c351c.exe 2990430  e4af2ca6aae2d9d3f38b7558a98c351c19/11/2019
20191212001228960674.exe 3039102  2923df1f889801f96dce3ef562a69e3713/12/2019
20200104010520610440.exe 1311760  5e6853ffdfee4c23c55a901245f24e3606/01/2020
1062-570d83997b916f7e1e90770a55bb40a718031cb6.exe 416256  cc5218f9577b8304f880fe81d650b83903/12/2020
2aa9e9ddbf99f8aff54a3db95dabf490.vir.exe 416256  2aa9e9ddbf99f8aff54a3db95dabf49016/12/2020
97242eec72c328275b3f2fc594bca371.exe 11047148  97242eec72c328275b3f2fc594bca37122/12/2020
4f253c7bd12d49474e29f528589227df.exe 4427472  4f253c7bd12d49474e29f528589227df25/12/2020
4a5b1a05b2747e2c0d8c70da7900e09b2af997db5c447dff8c614eaf50c91e85_sample.exe 4520260  1b047a8d5a7bbc9d0f1b6d22469a5e7526/12/2020
a91ae0600fe2e357902a7a00ef593cb7.exe 416256  a91ae0600fe2e357902a7a00ef593cb726/12/2020
ac5e2b04572f0326048e7667fce5833902788524765fe17e6a334220d6736434_sample.exe 7523440  02b0397ca459da31e9a9db932f2635fe29/12/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware