Microsoft has recently detected TrojanSpy:Win32/Bholog.B as a Trojan horse and spyware. Numerous AV programs detect the threat. Hence, it has a high detection rate. TrojanSpy:Win32/Bholog.B is most likely distributed via spam email attachments and corrupted websites. The threat may also exploit various vulnerabilities in Adobe Flash Player. Once detected, it should be removed immediately since various types of personal information can be stolen from users.
TrojanSpy:Win32/Bholog.B Technical Summary
Research indicates that the Trojan’s executable files are:
TrojanSpy:Win32/Bholog.B can create the following process:
→ cmd.exe /c C:\DOCUME~1\
The Trojan is created to steal personal data. Various credentials can be compromised irreversibly, including banking accounts.
The threat is detected as it follows by different AV solutions:
- AVG detects it as PSW.Generic12.BYFE
- Avast detects it as Win32:Malware-gen
- ESET-NOD32 detects it as a variant of Win32/Spy.KeyLogger.ODN
- F-Secure detects it as Gen:Variant.Graftor.199360
- Kaspersky detects it as Trojan.Win32.Agent.nesdgi
- McAfee detects it as Artemis!FB635DFDFA0D
- Symantec detects it as Trojan.Gen
As a total, 40 anti-virus programs detect the threat.
TrojanSpy:Win32/Bholog.B Removal Options
To remove the spyware threat completely, using professional help is highly recommended. Since various user credentials may have been stolen, taking steps to secure all accounts is also crucial. Using different, complex passwords for each account is advisory. Also, make sure to store such information at a safe place – the type that cannot be reached by cyber criminals. Users can choose to use password managers to protect their information.
A manual guide for TrojanSpy:Win32/Bholog.B is provided below the article.
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter