TrojanSpy.Win32.Yitai

Posted: March 28, 2006 | Category: Keyloggers
This is a e-mail stealer. It logs e-mail addresses and sends them to a certain e-mail. This keylogger-trojan is one of several e-mail stealing loggers family. The following files were created in the system:

F0Replay Trojan

Posted: March 28, 2006 | Category: Trojans
This small trojan is always a dangerous tool in the hands of experienced hacker. F0replay Trojan usually gives a control over infected machine to someone, who owns this trojan. That person is able to change many settings on the infected computer; this may lead to dangerous effects, such as data loss and unstable computer working. The following files were created in the system:

Remote Desktop

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Remote File Explorer

Posted: March 28, 2006 | Category: Remote Administration Tools
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

Remote Grab 1.0

Posted: March 28, 2006 | Category: Keyloggers
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...

TrojanSpy.Win32.Msks

Posted: March 28, 2006 | Category: Keyloggers
Keylogger is a simple application, that is used by hackers to steal information, such as passwords and usernames, from remote PCs. It secretly installs itself on your computer and logs all keystrokes in a file. Later the keylogger sends this file to hackers e-mail or FTP. The following files were created in the system:

TrojanSpy.Win32.NetCaptor

Posted: March 28, 2006 | Category: Keyloggers
This keylogger is designed for stealing valuable information, such as passwords and personal e-mails. All keystrokes, done by user are logged and stored in your PC, and later they are sent to the attacker. The following files were created in the system:

TrojanSpy.Win32.PcGhost

Posted: March 28, 2006 | Category: Keyloggers
This is a non-commercial keylogger. It is often used by hackers to steal information, which is being typed by the user. The application logs your keystrokes and sends them to attacker. The following files were created in the system:

TrojanSpy.Win32.PSpy

Posted: March 28, 2006 | Category: Keyloggers
A simple but effective hacker tool, used for stealing passwords and monitoring other PC activity, such as visited websites, written e-mails etc. The following files were created in the system:

FakeNetstat Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan usually pretends being a NetStat utility. When a user runs this spyware, it gives access to the infected PC to the hacker. The hacker can perform many actions on the remote machine; all of these actions are a potent threat, because they may lead to serious data losses or computer instability. The following files were created in the system:

Remote Server Trojan

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

RemoteShut

Posted: March 28, 2006 | Category: Remote Administration Tools
RemoteShut is a remote administration tool, but not a spyware. This legitimate utility allows the remote user to shutdown a PC running RemoteShut server component. It doesn't have any dangerous payload. However, hackers may use it for obvious malicious purposes, so it is recommended to remove RemoteShut from the computer, unless you really wish to use it.

Remote Viewport

Posted: March 28, 2006 | Category: Remote Administration Tools
Remote Viewport is a malicious RAT that gives the remote attacker unauthorized access to an infected PC. The spyware consists of client and server. The server runs on a compromised computer and takes screenshots of user activity. Remote Viewport uses files with random names, so it is quite difficult to detect.

Remote VIREUS

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

Remote XS

Posted: March 28, 2006 | Category: Remote Administration Tools
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...

TrojanSpy.Win32.Quazex

Posted: March 28, 2006 | Category: Keyloggers
This is a keylogging malware, used by hackers to steal valuable information from user. It secretly installs itself on your computer and logs every keystroke. After that, it sends the log file to attacker, so that he can study it, in order to find passwords etc. The following files were created in the system:

TrojanSpy.Win32.Recodat

Posted: March 28, 2006 | Category: Keyloggers
This keylogger is a malware application, created for non commercial spyonage. It logs all keystrokes to a file, and sends it to hacker. Valuable information, such as passwords and usernames can be lost. The following files were created in the system:

Trojanspy.Win32.Xinkey

Posted: March 28, 2006 | Category: Keyloggers
This is a non-commercial keylogger. It is often used by hackers to steal information, which is being typed by the user. The application logs your keystrokes and sends them to attacker. If not treated correctly, information loss is inevitable. The following files were created in the system:

TrojanSpy.Win32.Zhangyan

Posted: March 28, 2006 | Category: Keyloggers
A simple but effective hacker tool, used for stealing passwords and monitoring other PC activity, such as visited websites, written e-mails etc. It logs all keystrokes and sends this log to hacker. The following files were created in the system:

Vac Trojan

Posted: March 28, 2006 | Category: Trojans
This trojan, which is very similar to a simple virus scanner by its appearance, is really dangerous for any computer. When the user enables its 'scanner', this spyware start deleting many files from the hard drive. Although many antiviral computers are able to recognize and remove this pest, it is still very dangerous because inexperienced users, who believe this is an antiviral computer, might install and run it by themselves. The following files were created in the system: