Trojan

Trojan:Win32/Hioles.C removal tips

Malware Removal

The Trojan:Win32/Hioles.C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Hioles.C virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid

How to determine Trojan:Win32/Hioles.C?


File Info:

name: 74CA91992C10F3B1F744.mlw
path: /opt/CAPEv2/storage/binaries/5b383fa015e5d0aa56bf0b9936d959f073506b6b9274612977f18bfa018f3fc1
crc32: 07FDD6FF
md5: 74ca91992c10f3b1f744a93afb1d4df2
sha1: 0a2c75790cb00de26500cb0b168d70237477e1b9
sha256: 5b383fa015e5d0aa56bf0b9936d959f073506b6b9274612977f18bfa018f3fc1
sha512: b4cea4ccaea68cbc0c2880d6cca9a0e009ae7db00e8be515809f66dbe4f17443abd73ea7ad48df3fc7903ad3dfe458996c8abc18d73891db883e109c8344d1b7
ssdeep: 1536:YFSdiPNJQelcASQu/kg1bQ5KCFBcZd9eX1:oSDelco81bQ5KtZd+1
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B5A3E021B2388842F2F24336D496A65869AFD9F93FD1E5CF8A51A74D3420B21FE31335
sha3_384: d5f6a924fb7634bfa43753c9812c69e1e99e752e731f6dc686a4e2a1d97883e4d5b67fbeab7f9421c1facb5be63dca83
ep_bytes: 68007f00006a00ff1574904000e83e1c
timestamp: 2012-07-11 13:29:12

Version Info:

LegalCopyright: Philips-BenQ Digital Solutions 2005-2011
CompanyName: Philips-BenQ Digital Solutions
FileDescription: Winters 2011
FileVersion: 5.3.0
ProductVersion: 5.3.0
InternalName: Winters 2011
OriginalFilename: winters2011.exe
ProductName: Winters 2011
Translation: 0x0809 0x04b0

Trojan:Win32/Hioles.C also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Hioles.h!c
DrWebTrojan.Proxy.23012
MicroWorld-eScanGen:Variant.Razy.449908
FireEyeGeneric.mg.74ca91992c10f3b1
McAfeePWS-Zbot.gen.adn
CylanceUnsafe
VIPREGen:Variant.Razy.449908
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 003bab4d1 )
K7GWTrojan ( 003bab4d1 )
Cybereasonmalicious.92c10f
BitDefenderThetaGen:NN.ZexaF.34592.gy3@auzFFHmi
VirITTrojan.Win32.Zbot.JT
CyrenW32/Falab.G.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanProxy.Hioles.AC
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Proxy.Win32.Hioles.ggd
BitDefenderGen:Variant.Razy.449908
NANO-AntivirusTrojan.Win32.Jorik.vuclo
AvastWin32:Cryptor
TencentWin32.Trojan.Jorik.bsfy
Ad-AwareGen:Variant.Razy.449908
EmsisoftGen:Variant.Razy.449908 (B)
ComodoMalware@#3oy57onvahcg7
ZillyaTrojan.Jorik.Win32.110562
TrendMicroTROJ_HIOLES.AH
McAfee-GW-EditionPWS-Zbot.gen.adn
SophosML/PE-A + Mal/NecursDrp-A
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.449908
JiangminTrojan/Jorik.effm
WebrootW32.Jorik.Hioles
GoogleDetected
AviraTR/Jorik.Hioles.EB.1
Antiy-AVLTrojan/Generic.ASMalwS.B02
KingsoftWin32.Troj.Jorik..(kcloud)
ArcabitTrojan.Razy.D6DD74
MicrosoftTrojan:Win32/Hioles.C
CynetMalicious (score: 100)
AhnLab-V3Spyware/Win32.Zbot.R29893
VBA32TrojanProxy.Hioles
ALYacGen:Variant.Razy.449908
MAXmalware (ai score=89)
MalwarebytesTrojan.Agent.PHEX.Generic
TrendMicro-HouseCallTROJ_HIOLES.AH
RisingTrojan.Generic@AI.91 (RDML:aJKMXwkW2P3OixiZiS12cg)
YandexTrojan.GenAsa!ZzCE2ojc/8E
IkarusTrojan-Proxy.Win32.Hioles
FortinetW32/Injector.FJFE!tr
AVGWin32:Cryptor
PandaTrj/Pacrypt.C
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Hioles.C?

Trojan:Win32/Hioles.C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment