Categories: Trojan,Spyware
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
[Kaspersky]Trojan.Spy.Gologger.10,TrojanSpy.Win32.Gologger.10,Trojan.Spy.Gologger.20.b,TrojanSpy.Win32.Gologger.20.b;
[McAfee]KeyLog-God,Keylog-God;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Trojan Horse,Trojan Horse.LC,Univ.EP;
[Computer Associates]PHP/God!Keylogger!Trojan,Win32/Gologger.10!PWS!Trojan,Win32.God.20,Win32/God.20!Trojan
Visible Symptoms:
Files in system folders:
[%WINDOWS%]\gkl.dll
[%WINDOWS%]\gkl.dll
How to detect Keylog.God:
Files:
[%WINDOWS%]\gkl.dll
[%WINDOWS%]\gkl.dll
Removing Keylog.God:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Remove Nethief.0b2 RAT
FakeRecycled Trojan Symptoms
Tofsee Trojan Removal
No comments:
Post a Comment