Hey you,

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:

Remove TrojanSpy:Win32/Bholog from the System

p11_0000Microsoft has recently detected TrojanSpy:Win32/Bholog.B as a Trojan horse and spyware. Numerous AV programs detect the threat. Hence, it has a high detection rate. TrojanSpy:Win32/Bholog.B is most likely distributed via spam email attachments and corrupted websites. The threat may also exploit various vulnerabilities in Adobe Flash Player. Once detected, it should be removed immediately since various types of personal information can be stolen from users.

Download a System Scanner, to See If Your System Has Been Affected By TrojanSpy:Win32/Bholog.

TrojanSpy:Win32/Bholog.B Technical Summary

Research indicates that the Trojan’s executable files are:

  • image.exe
  • 66666
  • 66666.exe

TrojanSpy:Win32/Bholog.B can create the following process:

→ cmd.exe /c C:\DOCUME~1\~1\LOCALS~1\Temp\

The Trojan is created to steal personal data. Various credentials can be compromised irreversibly, including banking accounts.

The threat is detected as it follows by different AV solutions:

  • AVG detects it as PSW.Generic12.BYFE
  • Avast detects it as Win32:Malware-gen
  • ESET-NOD32 detects it as a variant of Win32/Spy.KeyLogger.ODN
  • F-Secure detects it as Gen:Variant.Graftor.199360
  • Kaspersky detects it as Trojan.Win32.Agent.nesdgi
  • McAfee detects it as Artemis!FB635DFDFA0D
  • Symantec detects it as Trojan.Gen

As a total, 40 anti-virus programs detect the threat.

TrojanSpy:Win32/Bholog.B Removal Options

To remove the spyware threat completely, using professional help is highly recommended. Since various user credentials may have been stolen, taking steps to secure all accounts is also crucial. Using different, complex passwords for each account is advisory. Also, make sure to store such information at a safe place – the type that cannot be reached by cyber criminals. Users can choose to use password managers to protect their information.

A manual guide for TrojanSpy:Win32/Bholog.B is provided below the article.

Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

1. Start Your PC in Safe Mode to Remove TrojanSpy:Win32/Bholog
2. Remove TrojanSpy:Win32/Bholog automatically with Spy Hunter Malware - Removal Tool.

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

More Posts - Website

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.