TrojanDownloader:Win32/CoinMiner.E
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
TrojanDownloader:Win32/CoinMiner.A
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.J
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.AB
Microsoft Defender Antivirus detects and removes this threat.
This threat can perform a number of actions of a malicious hacker's choice on your PC.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.R
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.Q
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.P
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.AJ
Microsoft Defender Antivirus detects and removes this threat.
This threat can perform a number of actions of a malicious hacker's choice on your PC.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
TrojanDownloader:PowerShell/CoinMiner
Microsoft Defender Antivirus detects and removes this threat.
This threat downloads and installs other programs, including other malware, onto your PC without your consent.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.D
Microsoft Defender Antivirus detects and removes this threat.
This CoinMiner trojan mines Electroneum cryptocurrency, but its code could support mining other cryptocurrencies. Like other miners, it can cause infected computers to run slower than usual.
TrojanDownloader:Win32/Dofoil.AB has been observed downloading this coin mining trojan and dropping it into the Temp folder as wuauclt.exe.
On March 6, 2018, behavior monitoring and machine learning technologies in Microsoft Defender Antivirus stopped a Dofoil malware (also known as Smoke Loader) that tried to infect more than 400,000 computers. The massive campaign aimed to install a Trojan:Win32/CoinMiner variant that uses victim computers' resources for coin mining purposes. Learn how artificial intelligence stopped the attack within minutes:
Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner
Microsoft Defender Antivirus detects and removes this threat.
This threat uses your PC to generate Bitcoins. It installs software that can make your PC run slower than usual.
This threat might have been bundled with other software you installed.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.B!cl
Microsoft Defender Antivirus uses the cloud and artificial intelligence powered by next-gen machine learning technologies to rapidly deliver protection against new and emerging malware.
This detection, made possible by cloud-based machine learning, defends against multiple types of emerging malware that perform various malicious actions on your PC.
Understand how malware can get on your PC
Our layered approach to intelligent, cloud-based protection employs a diverse set of machine learning models designed to catch the wide range of threats: from massive malware campaigns to small-scale, localized attacks. Read more: Small businesses targeted by highly localized Ursnif campaign
Trojan:Win32/CoinMiner.A!cl
Microsoft Defender Antivirus uses the cloud and artificial intelligence powered by next-gen machine learning technologies to rapidly deliver protection against new and emerging malware.
This detection, made possible by cloud-based machine learning, defends against multiple types of emerging malware that perform various malicious actions on your PC.
Understand how malware can get on your PC
Our layered approach to intelligent, cloud-based protection employs a diverse set of machine learning models designed to catch the wide range of threats: from massive malware campaigns to small-scale, localized attacks. Read more: Small businesses targeted by highly localized Ursnif campaign
Trojan:Win32/CoinMiner.C!cl
Microsoft Defender Antivirus uses the cloud and artificial intelligence powered by next-gen machine learning technologies to rapidly deliver protection against new and emerging malware.
This detection, made possible by cloud-based machine learning, defends against multiple types of emerging malware that perform various malicious actions on your PC.
Understand how malware can get on your PC
Our layered approach to intelligent, cloud-based protection employs a diverse set of machine learning models designed to catch the wide range of threats: from massive malware campaigns to small-scale, localized attacks. Read more: Small businesses targeted by highly localized Ursnif campaign
Trojan:Win64/CoinMiner
Microsoft Defender Antivirus detects and removes this threat.
While the specifics of this threat can change, it's designed to mine cryptocurrency and can impact system performance.
TrojanDownloader:Win32/CoinMiner.G
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
TrojanDownloader:Win32/CoinMiner.I
Microsoft Defender Antivirus detects and removes this threat.
This threat downloads and installs other programs onto your PC without your consent, including other malware.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners
Trojan:Win32/CoinMiner.AC
Microsoft Defender Antivirus detects and removes this threat.
This threat can perform a number of actions of a malicious hacker's choice on your PC.
Learn more about this type of threat: Invisible resource thieves: The increasing threat of cryptocurrency miners