Trojan

What is “Trojan.Win64.Occamy.vho”?

Malware Removal

The Trojan.Win64.Occamy.vho is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win64.Occamy.vho virus can do?

  • Unconventionial language used in binary resources: Russian

How to determine Trojan.Win64.Occamy.vho?


File Info:

crc32: 5B7C3CA2
md5: 04f0e34adae4a34c24d70aff3177c38e
name: 04F0E34ADAE4A34C24D70AFF3177C38E.mlw
sha1: 870058aba04528ec6ccc506a7cd2c65525d572b2
sha256: 90653951bebb853132e289843f34efb87aa7fb86eed0ed34cd138c734135fb07
sha512: 1312f7f49c5b5839041768a827288a7c47098d6c3995fc5ef29236940977f051d70ff3bee6da0a21dab3c654575d33ce2c5c77f744123b6f3ac6624e9d5a74d3
ssdeep: 6144:DWg035aZ6u+iWv35EyDC3t/i4fLMuOqSEL7yvSohvPOAe0I9K:DWp35aZ6u+i2EyDK1i1uZl2aoZ
type: PE32+ executable (console) x86-64, for MS Windows

Version Info:

0: [No Data]

Trojan.Win64.Occamy.vho also known as:

CylanceUnsafe
Cybereasonmalicious.ba0452
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win64.Occamy.vho
SentinelOneStatic AI – Malicious PE
AhnLab-V3Trojan/Win.Generic.C4702224
IkarusTrojan-Downloader.Win32.Generic

How to remove Trojan.Win64.Occamy.vho?

Trojan.Win64.Occamy.vho removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment