GWGhost Trojan

GWGhost virus description
Technical details:
Categories: Trojan,Spyware,Backdoor,Hacker Tool
GWGhost Aliases:
[Kaspersky]Backdoor.GWGirl.272,Trojan.Win32.GwGhost.20,TrojanSpy.Win32.GWGhost.b,TrojanSpy.Win32.GWGhost.c;
[Eset]Win32/GWGirl trojan;
[McAfee]BackDoor-SP;
[Panda]Trojan Horse.LC,Trojan Horse,Trj/Spy.GWGhost.B;
[Computer Associates]Win32.GWGhost.I,Win32/GWGhost.272!Trojan,Win32.GWGhost.E,Win32/Gwghost.21!Trojan,Win32.GWGhost.F,Win32/GWGhost!Dropper,Win32.GWGhost.G,Win32/GWGhost.25.C!Trojan,Win32/Gwghost.D!PWS!Trojan,Win32.GWGhost.25,Win32/GWGhost.27.Trojan

GWGhost indications of infection

This symptoms of GWGhost detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
popular.ru Tracking Cookie Cleaner
HLLP.6248!Dropper Trojan Removal
Remove Jeemp Backdoor
Chaploit Trojan Removal
VB.eo Backdoor Cleaner

No comments: