Home Malware Programs Spyware Keylogger.MGShadow

Keylogger.MGShadow

Posted: May 1, 2007

Threat Metric

Threat Level: 6/10
Infected PCs: 23
First Seen: July 24, 2009
Last Seen: May 12, 2019
OS(es) Affected: Windows

ScreenshotKeylogger.MGShadow is a keylogger application designed to log your keystrokes, web pages that you visit, chats that you attend and emails you get. In addition, Keylogger.MGShadow may regularly take screenshots of your PC. Then Keylogger.MGShadow will send all the collected information to the third parties. Usually, Keylogger.MGShadow hides itself from the user by running in stealth mode. Keylogger.MGShadow is a serious security risk for sensitive information and should be removed as soon as possible.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



Shadow.dll File name: Shadow.dll
Size: 176.64 KB (176640 bytes)
MD5: 37efd0d4646d9778bb2c4c3dd33d34ce
Detection count: 35
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 11, 2009

Registry Modifications

The following newly produced Registry Values are:

HKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Shadow

Additional Information

The following directories were created:
%ProgramFiles%\MGS trial

One Comment

  • Anhel says:

    The main problem about almost all 'traditional' anti-spyware tools is that you need to update signature bases in order to be protected. And also note that updates for most recent keyloggers are available only after some time the keylogger was released and found 🙂 Having come across this problem I started looking for something that would have different protecting mechanisms. And I found Anti-Keylogger program of Raytown. They use euhristic methods that do not require signature bases. I'm completely satisfied with the program and fell myself safe browsing the Internet.

Loading...