Home Malware Programs Trojans Trojan-PWS.Win32.Bjlog

Trojan-PWS.Win32.Bjlog

Posted: August 9, 2011

Trojan-PWS.Win32.Bjlog is an advanced Trojan that tries to conceal itself while creating holes in your computer's security to allow criminals to access the system. SpywareRemove.com malware research team has gathered evidence that categorizes Trojan-PWS.Win32.Bjlog as spyware as well as a Trojan, since Trojan-PWS.Win32.Bjlog has been observed taking screenshots and performing other disreputable forms of reconnaissance, as well as downloading and installing potentially harmful programs. Since the vast majority of Trojan-PWS.Win32.Bjlog infections are from China, keeping anti-malware security active and up-to-date while you interact with risky Chinese file sources and websites, may help you avoid a Trojan-PWS.Win32.Bjlog attack.

Trojan-PWS.Win32.Bjlog – the Spy That You'll Never See Coming

SpywareRemove.com malware research experts have found that variants of Trojan-PWS.Win32.Bjlog may use different methods to conceal themselves, but all Trojan-PWS.Win32.Bjlog infections noted so far will attempt some form of obfuscation to avoid being seen. One prominent method that Trojan-PWS.Win32.Bjlog has been seen using is to infect a normal system process, such has svchost.exe, while others may create a hidden process; such processes will not appear in Task Manager or other memory process-monitoring programs. Although in a distinct minority, some Trojan-PWS.Win32.Bjlog Trojans will create a randomly-named process instead, presumably in hopes of hiding from sheer lack of recognition.

All of the above methods allow Trojan-PWS.Win32.Bjlog to continue its spying and Trojan attacks without hindrances, since Trojan-PWS.Win32.Bjlog will launch by default whenever Windows starts. Exceptionally secure startup methods, such as Safe Mode, may let you access Windows without giving Trojan-PWS.Win32.Bjlog a chance to insert itself into the proceedings.

What You Can't See About Trojan-PWS.Win32.Bjlog Can Still Hurt You

Even though Trojan-PWS.Win32.Bjlog may not show many signs of being on your PC, the potential fallout from any Trojan-PWS.Win32.Bjlog infection can be quite severe. SpywareRemove.com malware researchers have noticed screenshot-capturing features as well as keylogging in Trojan-PWS.Win32.Bjlog and closely-related Trojan threats. These standard spyware functions are usually used to steal passwords, credit card information and other sensitive information. Once stolen, this information is transmitted over to criminal hands, and you may be able to notice Trojan-PWS.Win32.Bjlog activity by watching for unusual port, network or firewall setting changes.

Some Trojan-PWS.Win32.Bjlog variants will also gather network information that could be used to identify your PC or engage in other acts that are typical of Trojans, including installing other harmful programs, download arbitrary files, and deleting preexisting files or folders. These actions are controlled by configuration information that Trojan-PWS.Win32.Bjlog receives from a remote server, which allows different Trojan-PWS.Win32.Bjlog infections to create wildly different attacks.

Trojan-PWS.Win32.Bjlog is also known by a variety of aliases, such as W32/BackdoorX.DYQT, Backdoor.Win32.Agent.avvc, BackDoor.Agent.AHGH, Mal/Zegost-E, BDS/Agent.avvc.1 and Win32/Redosdru.CP.

Finally, even if you delete Trojan-PWS.Win32.Bjlog immediately with an appropriate security application, Trojan-PWS.Win32.Bjlog may be bundled with similar types of Trojan or spyware. Some of the most likely couplings that SpywareRemove.com malware analysts have observed include Backdoor:Win32/Zegost.B, Backdoor.Bapkri, VirTool:Win32/DelfInject.gen!BT, Trojan-GameThief.Win32.OnLineGames.bnhv and Backdoor:Win32/Farfli.K; all of these are variants of backdoor Trojans or spyware that reduce your computer's security, privacy and overall safety.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Windir%\Temp\svchast.exe 201187232136.exe File name: %Windir%\Temp\svchast.exe 201187232136.exe
File type: Executable File
Mime Type: unknown/exe

Registry Modifications

The following newly produced Registry Values are:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
Loading...