Spy

Win32/Spy.KeyLogger.OHL (file analysis)

Malware Removal

The Win32/Spy.KeyLogger.OHL is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Spy.KeyLogger.OHL virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering

How to determine Win32/Spy.KeyLogger.OHL?


File Info:

name: 4586B14C03BCEB497886.mlw
path: /opt/CAPEv2/storage/binaries/62d5a6aac81c99952c9a7ab8952a6a11a9e88b4467a7c7ee478bfb1d290ce49c
crc32: F27DE11E
md5: 4586b14c03bceb497886eb42a0763108
sha1: ea9e5d3e42e96bf74ca499028f30f526fa8f356d
sha256: 62d5a6aac81c99952c9a7ab8952a6a11a9e88b4467a7c7ee478bfb1d290ce49c
sha512: d1b527bdef8726797030728cc31de43a5e36be3450ecddce0dc796353b8a60267b27bad0eca97e95d2b63542f8cbdcadadc4beddc4d023907874707fb0b12c90
ssdeep: 6144:LHLeMy1FVxcghRll+H8m8Dxgbt1yc7WN34Mp4u+XNSn9MJPuwY+NIPBMjqwhh5gP:L9yVxZRlUIq8
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T11294B6C2C732104CF76259349DCB9125E8353C66AB65AA477289E52CB3F817B3E7620F
sha3_384: 8ff595d30cb28628cd29ebf99d910f65306d245641385a50c31ab9e39591de86213131119f9151cf6d9a314f4e50848e
ep_bytes: 6894b94000e8f0ffffff000000000000
timestamp: 2011-11-19 17:11:52

Version Info:

Translation: 0x0409 0x04b0
Comments: http://anthneic.blogspot.com/
CompanyName: http://anthneic.blogspot.com/
FileDescription: Cheat PB Injector
LegalCopyright: © 2011 aNtH
ProductName: Suntik Lib
FileVersion: 6.00
ProductVersion: 6.00
InternalName: suntik
OriginalFilename: suntik.exe

Win32/Spy.KeyLogger.OHL also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Multi.Generic.4!c
MicroWorld-eScanGen:Trojan.Heur.zm0@fzqlI6ci
McAfeeArtemis!4586B14C03BC
CylanceUnsafe
VIPREGen:Trojan.Heur.zm0@fzqlI6ci
SangforSuspicious.Win32.Save.vb
K7AntiVirusSpyware ( 0055e3db1 )
AlibabaTrojanSpy:Win32/KeyLogger.11b8a1ad
K7GWSpyware ( 0055e3db1 )
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Spy.KeyLogger.OHL
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Dropper.Cloud-6605913-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Trojan.Heur.zm0@fzqlI6ci
NANO-AntivirusTrojan.Win32.Skeeyah.ecdqfn
AvastWin32:Malware-gen
TencentWin32.Trojan.Generic.Ogil
Ad-AwareGen:Trojan.Heur.zm0@fzqlI6ci
SophosGeneric ML PUA (PUA)
ComodoMalware@#1yy457lzgtclj
DrWebBACKDOOR.Trojan
ZillyaTrojan.Keylogger.Win32.66714
McAfee-GW-EditionBehavesLike.Win32.Trojan.gh
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.4586b14c03bceb49
EmsisoftGen:Trojan.Heur.zm0@fzqlI6ci (B)
SentinelOneStatic AI – Suspicious PE
GDataGen:Trojan.Heur.zm0@fzqlI6ci
JiangminTrojan.Generic.etinv
GoogleDetected
AviraTR/Spy.Skeeyah.mpoj
MAXmalware (ai score=100)
Antiy-AVLTrojan/Generic.ASMalwS.3C54
MicrosoftTrojanSpy:Win32/Skeeyah.A!rfn
CynetMalicious (score: 100)
BitDefenderThetaAI:Packer.763125151C
ALYacGen:Trojan.Heur.zm0@fzqlI6ci
VBA32BScope.Trojan.Click
RisingSpyware.KeyLogger!8.12F (CLOUD)
YandexTrojanSpy.KeyLogger!Clx97cbLPOk
IkarusGen.Backdoor.Heur
MaxSecureTrojan.Malware.300983.susgen
FortinetRiskware/Injector.O
AVGWin32:Malware-gen
Cybereasonmalicious.c03bce
PandaTrj/CI.A

How to remove Win32/Spy.KeyLogger.OHL?

Win32/Spy.KeyLogger.OHL removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment