Malware

Application.Miner.JT removal instruction

Malware Removal

The Application.Miner.JT is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Miner.JT virus can do?

  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Installs OpenCL library, probably to mine Bitcoins
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine Application.Miner.JT?


File Info:

name: B84956F867A3A5751E39.mlw
path: /opt/CAPEv2/storage/binaries/693b9e9b69d2b1704909259e4177f218850574d14ed78e430dfe394f328b5533
crc32: 3E498757
md5: b84956f867a3a5751e39cc2024b85166
sha1: e148ede0a04832e091b3c68c268c39b3c4d2629f
sha256: 693b9e9b69d2b1704909259e4177f218850574d14ed78e430dfe394f328b5533
sha512: c083fd31238e948aa6388e90220d9bf934317cf643e262dc27446079ee9a7ba9574a90242a5bc1ae0db59d572a3bea131b06b8cbb5621bc9153107ef0ce3538f
ssdeep: 98304:vgwRs0vMELZutt3b47hge/ElnXhvcOmodf4LaIxCPJNRSkFiG/NBe9SDrb+2H4Q:vghsTQ47hge/QXhU/CPJN0k0G/PFDrbZ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14F4633F1EFFAA874E0522672B640607D3BEBAF0DDE344CE7D647B605A4214C221B425B
sha3_384: 5eb5ed8eb0a093b10734deeb6eae97c67baf1bc40504475394497a24875a46486f6135e5ed001c5a42e7aa664acbf559
ep_bytes: 558bec6aff6870c4410068c095410064
timestamp: 2012-12-31 00:38:51

Version Info:

CompanyName: Oleg N. Scherbakov
FileDescription: 7z Setup SFX (x86)
FileVersion: 1.6.0.2712
InternalName: 7ZSfxMod
LegalCopyright: Copyright © 2005-2012 Oleg N. Scherbakov
OriginalFilename: 7ZSfxMod_x86.exe
PrivateBuild: December 30, 2012
ProductName: 7-Zip SFX
ProductVersion: 1.6.0.2712
Translation: 0x0000 0x04b0

Application.Miner.JT also known as:

LionicRiskware.MSIL.BitMiner.1!c
DrWebTool.BtcMineNET.2
MicroWorld-eScanApplication.Miner.JT
FireEyeApplication.Miner.JT
CAT-QuickHealTrojan.Agent
McAfeeArtemis!B84956F867A3
CylanceUnsafe
SangforCoinMiner.MSIL.BitMiner.gen
K7AntiVirusAdware ( 005749d21 )
AlibabaRiskWare:MSIL/Miners.9d51772f
K7GWAdware ( 005749d21 )
Cybereasonmalicious.867a3a
CyrenTrojan.JEYU-6
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of MSIL/CoinMiner.AA potentially unwanted
APEXMalicious
Kasperskynot-a-virus:UDS:RiskTool.MSIL.BitMiner.gen
BitDefenderApplication.Miner.JT
NANO-AntivirusRiskware.Win64.BtcMine.iufapx
SophosGeneric Reputation PUA (PUA)
VIPRETrojan.Win32.Generic!BT
TrendMicroPUA.Win64.NiceHashMiner.I.component
McAfee-GW-EditionCoinMiner-FBG
EmsisoftApplication.Miner.JT (B)
SentinelOneStatic AI – Malicious PE
GDataMSIL.Application.NiceHashMiner.A (76x)
GridinsoftRansom.Win32.Gen.sa
ArcabitApplication.Miner.JX
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4198781
ALYacApplication.Miner.JT
MAXmalware (ai score=85)
MalwarebytesRiskWare.BitCoinMiner
TrendMicro-HouseCallPUA.Win64.NiceHashMiner.I.component
RisingHackTool.CoinMiner!1.D742 (CLASSIC)
MaxSecureTrojan.Malware.117109451.susgen
FortinetW32/BtcMineNET.2!tr
AVGWin64:PUP-gen [PUP]
AvastWin64:PUP-gen [PUP]

How to remove Application.Miner.JT?

Application.Miner.JT removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment