Erase Trojan

Posted: March 28, 2006 | Category: Trojans
This malicious application is a trojan; this means that it doesn't strive for sending its copies to many addresses, but concentrates on one particular computer. The main aim of this spyware is damaging the infected machine by erasing boot sectors of the hard drive. The loss of these sectors usually leads to negative effects, such as computer instability. The following files were created in the system:

Eric Trojan

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which means that it usually concentrates on damaging one single PC instead of trying to infect as many machines as possible. Eric Trojan usually performs a set of destructive actions, which can strongly harm the infected computer and lead to several unwanted consequences, such as computer instability or loss of performance. The following files were created in the system:

Erkle trojan

Posted: March 28, 2006 | Category: Trojans
Although this trojan is quite old, it is still able to make several problems to those, who have no defence on their PCs. With its simple, but nevertheless quite effective algorithm, Erkle Trojan modifies many computer settings and files and leads to computer instability. The following files were created in the system:

ERRB Trojan

Posted: March 28, 2006 | Category: Trojans
There are no doubts about how dangerous this trojan can be. ERRB usually makes a lot of brutal damage to the infected computer; as a result of this spyware's activity a loss of important data may occur. It's always tremendously important to prevent ERRB trojan from sneaking into your PC. The following files were created in the system:

RemotanZ - Clone

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

Remote Administration Tool

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

Remote Administrator (rat)

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

BAT.Erro

Posted: March 28, 2006 | Category: Trojans
This batch-file infector may lead to several tremendously dangerous consequences if no actions against it are taken immediately. By infecting other files, this spyware makes computer work in unstable way, which can cause other negative effects . The following files were created in the system:

Evulz.785.A

Posted: March 28, 2006 | Category: Trojans
This spyware is a trojan, which usually concentrates on damaging one particular PC. Although a lot of antiviral computers can recognize and remove this trojan soon after infection, it is still able to make a lot of difficulties to unprotected computers by damaging many files . The following files were created in the system:

ExeBug Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually deals with EXE-files by changing their headers and contents. These actions may lead to improper working of many softwares and the computer instability in whole. ExeBug Trojan usually sneaks into the computer from many Internet resources , that's why it's strongly recommended to keep your antiviral databases updated. The following files were created in the system:

ExeBinder

Posted: March 28, 2006 | Category: Trojans
This malicious software is often being used for infecting the target machine with other spywares. ExeBinder is able to drop several lines of hostile code into the computer; this code usually is a trojan, which starts performing its destructive actions immediately. It's always the best choice to keep your antiviral computers up-to-date in order to prevent ExeBinder from infecting your PC. The following files were created in the system:

ExecuteChanger

Posted: March 28, 2006 | Category: Trojans
This trojan usually sneaks silently into the target PC and starts its destructive activities by hiding as a background process. Its activities may often seriously damage the infected PC, that's why it's strongly recommended to detect and remove this pest from the infected machine as soon as possible. The following files were created in the system:

Express 2.01

Posted: March 28, 2006 | Category: Trojans
This backdoor is always a potent threat for any computer. Express 2.01 usually allows a hacker to break into the infected computer and change its settings. The hacker is also able to install many applications or steal personal data . This spyware is really dangerous and harmful, that's why its removal would be the best choice. The following files were created in the system:

Remote Computer Control Center

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

Remote Control System 2.7

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

Remote Controler 1.0

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

EXPScan 03

Posted: March 28, 2006 | Category: Trojans
This trojan pretends to be an exploit scanner. It usually hides as a background process, mines data on the infected PC and sends mined data to the specified address. These actions may seriously harm user's security, that's why it's recommended to remove this spyware as soon as possible. The following files were created in the system:

ExStar Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually infects the computer via many Internet services, such as peer-to-peer networks or suspicious e-mail messages. By sending private information to the hacker, ExStar seriously harms user's privacy and security, that's why this spyware should be detected and removed from the infected machine as soon as possible. The following files were created in the system:

Exterminator Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan usually allows hacker to get into affected PC and perform many dangerous actions there. These actions may vary from damaging computer settings by changing key components to stealing personal data. It is always recommended to keep your virus-lists up-to-date in order to prevent this spyware from infecting your computer. The following files were created in the system:

Extusr Trojan

Posted: March 28, 2006 | Category: Trojans
This dangerous trojan, which was written in C language in 1998, is a potent threat for every user, who has no reliable defence computer installed on his or her PC. Extusr Trojan is able to damage critical computer components, which are responsible for stable computer working. The loss of these components may lead to many consequences, such as constant computer crashes. The following files were created in the system: