Files signed by H-Bit, d.o.o.

H-Bit, d.o.o.

H-Bit, d.o.o. is a digital signature publisher name observed in ThreatInfo records. This page groups 16 signed files and shows whether those files are currently classified as clean, undefined, or detected.

A digital signature can help identify a publisher, but it does not always prove that a file is safe. Certificates may be abused, stolen, expired, or attached to modified installers, so the file hash and detection status should be checked together.

Detection signal

Detected files use this signature name

At least one file signed as H-Bit, d.o.o. is detected by GridinSoft. Review the hashes below and scan the device if one of these files is present.

Download GridinSoft scanner
nhm_windows_3.1.1.0.exe f8150f79dc9ff6bd7d6125833d40fd4d Risk.CoinMiner
MP.LolMiner.dll 77947c20147edcbf98aede12fc847c0f Trojan.CoinMiner
app_nhm.exe 3b39cf64643f76b4e217190cb5a7c775 Trojan.CoinMiner
MP.__DEV__FakePlugin.dll 08b952425f8f74f0e5a3a683e0f624bf Trojan.CoinMiner
NiceHashMiner.exe a8e9a74893e23463a7fe58adad5ccf21 Trojan.CoinMiner
app_nhm.dll f06eb0bc5f0268792f14a40e198fff45 Risk.CoinMiner
MP.NBMiner.dll 040bc1b35799f3522a4dfc91bc1d19bc Trojan.CoinMiner
MP.LolMiner.dll 4bb778955e8630285396bdecc498b090 Trojan.CoinMiner
MP.Excavator.dll 15eb6753b84a25db694aaf9cb69bd863 Trojan.CoinMiner
MP.GMiner.dll fe99d6830acb024fd78c25c0e7583a61 Trojan.CoinMiner
MP.Joker.dll aac46122b421ac85863f4c67eb4062a0 Trojan.CoinMiner
NiceHashQuickMiner.exe 720b061ba24f75f5aefc45a7a6179672 Risk.CoinMiner
$RFCY4O7.exe 224bc8682c56f26cc0e2fac5dea5c84c Risk.CoinMiner
$RYNP95P.exe 1d33184c67f2d635cd60f8bf8bd0a7cc Trojan.Heur!
NHM.DeviceDetection.dll 16b54ec49bcaeb4cc81c4b48190b9cb8 Trojan.CoinMiner
pid_controller.dll df41e39c31fb928b8f0c8152449f5d45 Trojan.Agent

Certificate review summary

Do not trust this signature name by itself

ThreatInfo found detected files associated with H-Bit, d.o.o.. A matching signature name should be checked together with the file hash, detection verdict, and source path.

Recommended checks

  • Open any matching file report and compare the MD5 hash.
  • Confirm the file path and download source before trusting the binary.
  • Run a GridinSoft scan if a detected file from this list is present.