How to Remove “ZHR2970.EXE”

4

Malware Entries

First Seen: 03 April 2008 at 4:52 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable 249ab2c08bd1a470
98c3bbd145346f05
f590e75a
5af90d8ec3a42b74
a6b96900feab321e
Virus.DOS.Lo
z.2970
No N/A N/A United States N/A
2 N/A Executable 249ab2c08bd1a470
98c3bbd145346f05
f590e75a
5af90d8ec3a42b74
a6b96900feab321e
Virus.DOS.Lo
z.2970
No N/A N/A United Kingdom N/A
3 N/A Executable 249ab2c08bd1a470
98c3bbd145346f05
f590e75a
5af90d8ec3a42b74
a6b96900feab321e
Virus.DOS.Lo
z.2970
No N/A N/A Internal Submission N/A
4 N/A Executable 249ab2c08bd1a470
98c3bbd145346f05
f590e75a
5af90d8ec3a42b74
a6b96900feab321e
Virus.DOS.Lo
z.2970
No N/A N/A Internal Submission N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
6

Safe Entries

First Seen: 07 February 2009 at 9:49 am
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable a2ea975a73482e90
ca45dc679c9d442a
4f0575c9
7d52e2dd54c45599
684fcc52e7e360b5
No N/A N/A China
2 N/A Executable 6f2efcc9970286fe
8931f038897cae0c
d9e802f0
796956fcf58ff688
a2e8df96317ca2fb
No N/A N/A 10.224.1.116/32
3 N/A Executable 6f2efcc9970286fe
8931f038897cae0c
d9e802f0
796956fcf58ff688
a2e8df96317ca2fb
No N/A N/A Internal Submission
4 N/A Executable 6f2efcc9970286fe
8931f038897cae0c
d9e802f0
796956fcf58ff688
a2e8df96317ca2fb
No N/A N/A 10.224.1.117/32
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks