Trojan.Gataka.D is a variant of Win32/Gataka, a Trojan which has been helping cyber criminals to convey cyber attacks against European banks since 2011; however, the recent infection, active since May of 2012, is now targeting all Windows systems and all Windows users. Despite being tremendously latent and barely noticeable, the dangerous infection is composed of various executables, which will be added to your personal system’s registry upon illicit, unauthorized execution. So, if you want Trojan.Gataka.D removed from your computer, you firstly need to detect and delete all of these dangerous components.
Malignant Trojan’s executables LicenseValidator.exe, renovator.exe, validator.exe and UpgradeChecker.exe can all be located in the Application Data folder; however, it could be extremely dangerous to delete them manually, as they use cloaked names, which means that there is a high chance of having authentic Windows components deleted. Validator.exe is exactly that kind of a file, and the original .exe with this name has been developed by WestByte company that designs and distributes computer software, like Check Point Endpoint Security Cleaner, to which validator.exe belongs to. The camouflaged Trojan.Gataka.D executable can delete registry entries, disable safe mode, reconfigure Windows Security Center to block malware detection and removal attributes, and can even use your personal accounts to perform mass spam email attacks, using Multipurpose Internet Mail Extensions protocols.
Despite being so malignant, validator.exe is not the only piece of malware you need to detect and delete from your system, as such additional threats as cv.exe, stub.exe and server.exe are well know components which could be attached to the infection in the long run. Unfortunately, all of these high-risk executables are capable of implementing rootkit operations which could camouflage the entire Trojan from removal.
Trojan.Gataka.D is also known by such names as Win32/Gataka.B, Trojan:Win32/Gataka.D, Trojan.Win32.Gataka, Trojan/Win32.Jorik, Trojan/Win32.Buzus, etc.; however, different detection names do not mean that the application is any less dangerous, or its removal will be less complicated. If you delete Trojan.Gataka.D right after you first notice some computer function disturbances, there is no doubt that your system’s integrity will be restored immediately. This could be not the case, if you decided to wait another day or even an hour. So, hurry up and delete the Trojan with automatic removal tools, or trust your personal skills and knowledge to succeed manually.
- Connects to the internet without permission
- Installs itself without permissions
- Slow Computer
- Slow internet connection
- System crashes